Deck 12: Databases and Database Management Systems

Full screen (f)
exit full mode
Question
Typically, in hierarchical database management systems, a one-to-one relationship exists between data entities.
Use Space or
up arrow
down arrow
to flip the card.
Question
IBM's DB2 program contains a hybrid XML/relational database server.
Question
Hashing procedures usually result in two or more records being assigned the same storage address, an event known as a collision.
Question
Repairing or restoring data that has become corrupt, such as the result of a storage media error or a computer virus, is a database analysis activity.
Question
The data dictionary includes data located in the database tables.
Question
If a field needs to store decimal places, the Long Integer field size can be used.
Question
Some client-server database systems just have two parts (the clients and the server), others have at least one middle component between the client and the server; these systems are referred to as n-tier database systems.
Question
A database that combines object and relational database technology can be referred to as an object-oriented database management system (OODBMS).
Question
Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity.
Question
Normalization is usually viewed as a multistep process, moving the table structures from first normal form (1NF) to usually fifth normal form (5NF).
Question
N-tier database systems provide a great deal of flexibility and scalability, allowing the system to be modified as new needs and opportunities arise.
Question
A database typically consists of interrelated tables that contain forms and reports.
Question
​One of the most common types of software used in conjunction with a multi-dimensional database is Online Analytical Processing (OLAP).
Question
Most databases created today do not use the hierarchical or network models; however, these models, which are generally used with legacy mainframe systems, are still operational and so must be maintained.
Question
Arranging data for efficient retrieval is called data organization.
Question
Data integrity refers to the accuracy of data.
Question
Views need to be designed to extract the requested information from a relational database, as efficiently as possible.
Question
To protect against data loss caused by a database failure, an accidental deletion, or another problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.
Question
Data accessibility refers to protecting data against destruction and misuse-both intentional and accidental.
Question
Object-oriented and multidimensional databases are two examples of NoSQL (Not Only SQL) databases.
Question
A ____ is a collection of related fields.

A) table
B) field
C) column
D) record
Question
A(n) file management system is a program that allows the creation of individual database tables, each of which is stored in its own physical file and is not related to any other file. _________________________
Question
Structured query language (SQL) is recognized as the standard query language for relational databases. _________________________
Question
A ____ holds a single category of data (such as customer names or employee phone numbers) that will be stored in a database.

A) cell
B) field
C) table
D) record
Question
In determining where to store specific data in a(n)  centralized DBMS , factors such as communications cost, response time, storage cost, and security are key considerations. _________________________
Question
One advantage of the n-tier architecture is that it allows the program code used to access the database to be separate from the database, and the code can be divided into any number of logical components. _________________________
Question
The finished specifications for a table are commonly referred to as the table format . _________________________
Question
The field in a table that is used to relate that table to other tables is called the ____.

A) composite key
B) secondary key
C) primary key
D) primary field
Question
Software that connects two otherwise separate applications (such as a Web server and a DBMS) is referred to as interware . _________________________
Question
NoSQL databases are organized differently than relational databases are organized and therefore, they do not usually use tables and SQL. _________________________
Question
At the lowest level, words are entered into database fields (columns), which hold single pieces of data in the database, such as product names or quantities. _________________________
Question
To protect against data loss due to disasters, some firms maintain a redundant copy of the database on a(n) mirrored ​drive , backing up the data at very frequent intervals to an off-site location. _________________________
Question
Database developers are the people responsible for managing the databases within an organization. _________________________
Question
A record is also called a ____.

A) field
B) report
C) row
D) table
Question
After all the tables in a database application have been created and their primary keys designated, the tables can be related to one another via their primary keys so that a primary key for one table can be used to extract data from other tables as needed. _________________________
Question
One emerging data security risk is the exploitation of known but unpatched vulnerabilities by hackers. _________________________
Question
A field is also called a ____.

A) column
B) row
C) table
D) record
Question
Objects stored in an OODBMS can be retrieved using queries, such as with queries written in object query language (OQL) -an object-oriented version of SQL. _________________________
Question
Cloud databases allow Web pages to be static Web pages; that is, Web pages in which the appearance or content of the pages changes based on the user's input. _________________________
Question
Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as creating forms and reports and interfacing with query languages and ____ for complex applications.

A) query wizards
B) programming languages
C) report generators
D) form screens
Question
____ are made up of related records.

A) Rows
B) Fields
C) Columns
D) Tables
Question
In a typical client-server database application, the client is called the ____.

A) back end
B) rear end
C) portal
D) front end
Question
Virtually all DBMSs include a ____ for easy data input, modification, and retrieval.

A) user interface
B) line interface
C) command interface
D) device interface
Question
A(n) ____ is a small table consisting only of the primary key field and the location information for each record.

A) tablet
B) keyword
C) index
D) main table
Question
The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.

A) database book
B) data dictionary
C) data box
D) data book
Question
DBMSs available for use on personal computers include ____ and Corel Paradox.

A) IBM DB2
B) Microsoft Access
C) Adobe Acrobat
D) Adobe Fireworks
Question
____ create the actual database based on the design generated by the database designer and get it ready for data entry.

A) Database developers
B) Database administrators (DBAs)
C) Database security officers
D) Database analysts
Question
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.

A) normalization
B) cyclic redundancy check
C) zeroing
D) zonification
Question
If a new database is to be used with existing data, the data needs to be transferred from the old files to the new system-a process called ____.

A) data migration
B) data conversion
C) data normalization
D) data accommodation
Question
The characteristics of an entity are called ____.

A) attributes
B) variables
C) traits
D) fields
Question
With ____, the computer uses each record's primary key field and a mathematical formula called a hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.

A) real-time organization
B) indexed organization
C) sequenced organization
D) direct organization
Question
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.

A) power of two
B) prime number
C) irrational number
D) transcendental number
Question
In ____, the table field involved in the changes is locked until the changes to that field have been completed.

A) column-level locking
B) database locking
C) row-level locking
D) record-level locking
Question
A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.

A) form
B) query
C) macro
D) view
Question
Individual database tables are often referred to as ____.

A) low files
B) base files
C) flat files
D) clear files
Question
____ is a growing concern because of the vast amounts of personal data stored in databases today and the many data privacy breaches that are occurring.

A) Data privacy
B) Data integrity
C) Data accessibility
D) Data legibility
Question
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.

A) records
B) rows
C) fields
D) characters
Question
The ____ is the most widely used database model today.

A) hierarchical database management system
B) relational database management system (RDBMS)
C) network database management system
D) database management system (DBMS)
Question
One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.

A) format structure
B) input mask
C) data mask
D) data filter
Question
With a ____, the databases used by the system are all located on a single computer, such as a server or mainframe computer.

A) distributed database system
B) star database system
C) centralized database system
D) ring database system
Question
Continually evaluating and improving the security measures used with the database is a database ____ activity.

A) programming
B) design
C) implementation
D) maintenance
Question
Middleware for cloud database applications is commonly written as ____-short sections of code written in a programming or scripting language that are executed by another program.

A) scripts
B) JavaScripts
C) applets
D) utilities
Question
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases; therefore, they decide to use the ____ language.

A) CGI
B) API
C) COBOL
D) PHP
Question
A(n) ____________________ in a database table must uniquely identify each record in that table.
Question
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables.

A) index validation
B) record validation
C) DBA validation
D) dynamic
Question
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.

A) using the database script
B) through the database designer
C) through the database programmer
D) using the user interface
Question
____________________ entity relationships exist when one entity is related to only one other entity of a particular type.
Question
The key characteristics for an OODBMS (including objects, attributes, methods, ____, and inheritance) are similar to the object-oriented programming principles.

A) pages
B) scripting
C) conversion
D) classes
Question
To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to create a query object.

A) command
B) line
C) wizard
D) key
Question
Case-Based Critical Thinking Questions Case 14-1 James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT. James is most interested in becoming a database designer. Another name for this career choice is database ____.

A) engineer
B) developer
C) programmer
D) administrator
Question
A key component of a DBMS is the ____________________ , the part of the program that actually stores and retrieves data.
Question
In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

A) VBScript
B) CGI
C) PHP
D) BasicScript
Question
Some database programs allow you to create a table by just entering data and the program will create the ____________________ based on the data entered.
Question
The ____________________ in a database system are the ones who enter data, update data, and retrieve information from the database when necessary.
Question
A ____ displays table information with a more formal, businesslike appearance.

A) report
B) query
C) form
D) field
Question
Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.

A) middleware
B) capsules
C) macros
D) applets
Question
Case-Based Critical Thinking Questions Case 14-1 James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT. James learns that database designers work with systems analysts and other individuals involved in the ____.

A) CCP
B) DBMS
C) SDLC
D) CDMP
Question
The term ____ refers to a wide variety of different database technologies that were developed in order to overcome some of the limitations of relational databases.

A) multidimensional
B) object-oriented
C) NoSQL
D) SQL
Question
____________________ refers to the process of ensuring that the data entered into a database matches the specified type, format, and allowable value for each field.
Question
____ databases are designed to store a collection of summarized data for quick and easy data analysis.

A) Relational
B) Object-oriented
C) Analytical
D) Multidimensional
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Databases and Database Management Systems
1
Typically, in hierarchical database management systems, a one-to-one relationship exists between data entities.
False
2
IBM's DB2 program contains a hybrid XML/relational database server.
True
3
Hashing procedures usually result in two or more records being assigned the same storage address, an event known as a collision.
True
4
Repairing or restoring data that has become corrupt, such as the result of a storage media error or a computer virus, is a database analysis activity.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
The data dictionary includes data located in the database tables.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
If a field needs to store decimal places, the Long Integer field size can be used.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Some client-server database systems just have two parts (the clients and the server), others have at least one middle component between the client and the server; these systems are referred to as n-tier database systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
A database that combines object and relational database technology can be referred to as an object-oriented database management system (OODBMS).
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Normalization is usually viewed as a multistep process, moving the table structures from first normal form (1NF) to usually fifth normal form (5NF).
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
N-tier database systems provide a great deal of flexibility and scalability, allowing the system to be modified as new needs and opportunities arise.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
A database typically consists of interrelated tables that contain forms and reports.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
​One of the most common types of software used in conjunction with a multi-dimensional database is Online Analytical Processing (OLAP).
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
Most databases created today do not use the hierarchical or network models; however, these models, which are generally used with legacy mainframe systems, are still operational and so must be maintained.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Arranging data for efficient retrieval is called data organization.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
Data integrity refers to the accuracy of data.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Views need to be designed to extract the requested information from a relational database, as efficiently as possible.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
To protect against data loss caused by a database failure, an accidental deletion, or another problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Data accessibility refers to protecting data against destruction and misuse-both intentional and accidental.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Object-oriented and multidimensional databases are two examples of NoSQL (Not Only SQL) databases.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
A ____ is a collection of related fields.

A) table
B) field
C) column
D) record
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) file management system is a program that allows the creation of individual database tables, each of which is stored in its own physical file and is not related to any other file. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
Structured query language (SQL) is recognized as the standard query language for relational databases. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
A ____ holds a single category of data (such as customer names or employee phone numbers) that will be stored in a database.

A) cell
B) field
C) table
D) record
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
In determining where to store specific data in a(n)  centralized DBMS , factors such as communications cost, response time, storage cost, and security are key considerations. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
One advantage of the n-tier architecture is that it allows the program code used to access the database to be separate from the database, and the code can be divided into any number of logical components. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
The finished specifications for a table are commonly referred to as the table format . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
The field in a table that is used to relate that table to other tables is called the ____.

A) composite key
B) secondary key
C) primary key
D) primary field
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
Software that connects two otherwise separate applications (such as a Web server and a DBMS) is referred to as interware . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
NoSQL databases are organized differently than relational databases are organized and therefore, they do not usually use tables and SQL. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
At the lowest level, words are entered into database fields (columns), which hold single pieces of data in the database, such as product names or quantities. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
To protect against data loss due to disasters, some firms maintain a redundant copy of the database on a(n) mirrored ​drive , backing up the data at very frequent intervals to an off-site location. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
Database developers are the people responsible for managing the databases within an organization. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
A record is also called a ____.

A) field
B) report
C) row
D) table
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
After all the tables in a database application have been created and their primary keys designated, the tables can be related to one another via their primary keys so that a primary key for one table can be used to extract data from other tables as needed. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
One emerging data security risk is the exploitation of known but unpatched vulnerabilities by hackers. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
A field is also called a ____.

A) column
B) row
C) table
D) record
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
Objects stored in an OODBMS can be retrieved using queries, such as with queries written in object query language (OQL) -an object-oriented version of SQL. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Cloud databases allow Web pages to be static Web pages; that is, Web pages in which the appearance or content of the pages changes based on the user's input. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as creating forms and reports and interfacing with query languages and ____ for complex applications.

A) query wizards
B) programming languages
C) report generators
D) form screens
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
____ are made up of related records.

A) Rows
B) Fields
C) Columns
D) Tables
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
In a typical client-server database application, the client is called the ____.

A) back end
B) rear end
C) portal
D) front end
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
Virtually all DBMSs include a ____ for easy data input, modification, and retrieval.

A) user interface
B) line interface
C) command interface
D) device interface
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
A(n) ____ is a small table consisting only of the primary key field and the location information for each record.

A) tablet
B) keyword
C) index
D) main table
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.

A) database book
B) data dictionary
C) data box
D) data book
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
DBMSs available for use on personal computers include ____ and Corel Paradox.

A) IBM DB2
B) Microsoft Access
C) Adobe Acrobat
D) Adobe Fireworks
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
____ create the actual database based on the design generated by the database designer and get it ready for data entry.

A) Database developers
B) Database administrators (DBAs)
C) Database security officers
D) Database analysts
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.

A) normalization
B) cyclic redundancy check
C) zeroing
D) zonification
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
If a new database is to be used with existing data, the data needs to be transferred from the old files to the new system-a process called ____.

A) data migration
B) data conversion
C) data normalization
D) data accommodation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
The characteristics of an entity are called ____.

A) attributes
B) variables
C) traits
D) fields
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
With ____, the computer uses each record's primary key field and a mathematical formula called a hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.

A) real-time organization
B) indexed organization
C) sequenced organization
D) direct organization
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.

A) power of two
B) prime number
C) irrational number
D) transcendental number
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
In ____, the table field involved in the changes is locked until the changes to that field have been completed.

A) column-level locking
B) database locking
C) row-level locking
D) record-level locking
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.

A) form
B) query
C) macro
D) view
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
Individual database tables are often referred to as ____.

A) low files
B) base files
C) flat files
D) clear files
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
____ is a growing concern because of the vast amounts of personal data stored in databases today and the many data privacy breaches that are occurring.

A) Data privacy
B) Data integrity
C) Data accessibility
D) Data legibility
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.

A) records
B) rows
C) fields
D) characters
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
The ____ is the most widely used database model today.

A) hierarchical database management system
B) relational database management system (RDBMS)
C) network database management system
D) database management system (DBMS)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.

A) format structure
B) input mask
C) data mask
D) data filter
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
With a ____, the databases used by the system are all located on a single computer, such as a server or mainframe computer.

A) distributed database system
B) star database system
C) centralized database system
D) ring database system
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
Continually evaluating and improving the security measures used with the database is a database ____ activity.

A) programming
B) design
C) implementation
D) maintenance
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Middleware for cloud database applications is commonly written as ____-short sections of code written in a programming or scripting language that are executed by another program.

A) scripts
B) JavaScripts
C) applets
D) utilities
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases; therefore, they decide to use the ____ language.

A) CGI
B) API
C) COBOL
D) PHP
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
A(n) ____________________ in a database table must uniquely identify each record in that table.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables.

A) index validation
B) record validation
C) DBA validation
D) dynamic
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.

A) using the database script
B) through the database designer
C) through the database programmer
D) using the user interface
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
____________________ entity relationships exist when one entity is related to only one other entity of a particular type.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
The key characteristics for an OODBMS (including objects, attributes, methods, ____, and inheritance) are similar to the object-oriented programming principles.

A) pages
B) scripting
C) conversion
D) classes
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to create a query object.

A) command
B) line
C) wizard
D) key
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
Case-Based Critical Thinking Questions Case 14-1 James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT. James is most interested in becoming a database designer. Another name for this career choice is database ____.

A) engineer
B) developer
C) programmer
D) administrator
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
A key component of a DBMS is the ____________________ , the part of the program that actually stores and retrieves data.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

A) VBScript
B) CGI
C) PHP
D) BasicScript
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
Some database programs allow you to create a table by just entering data and the program will create the ____________________ based on the data entered.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
The ____________________ in a database system are the ones who enter data, update data, and retrieve information from the database when necessary.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
A ____ displays table information with a more formal, businesslike appearance.

A) report
B) query
C) form
D) field
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.

A) middleware
B) capsules
C) macros
D) applets
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
Case-Based Critical Thinking Questions Case 14-1 James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT. James learns that database designers work with systems analysts and other individuals involved in the ____.

A) CCP
B) DBMS
C) SDLC
D) CDMP
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
The term ____ refers to a wide variety of different database technologies that were developed in order to overcome some of the limitations of relational databases.

A) multidimensional
B) object-oriented
C) NoSQL
D) SQL
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
____________________ refers to the process of ensuring that the data entered into a database matches the specified type, format, and allowable value for each field.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
____ databases are designed to store a collection of summarized data for quick and easy data analysis.

A) Relational
B) Object-oriented
C) Analytical
D) Multidimensional
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.