Deck 14: Databases and Database Management Systems

ملء الشاشة (f)
exit full mode
سؤال
Normalization is usually viewed as a multistep process, from first normal form (1NF) to usually fifth normal form (5NF).
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as building user interfaces, creating forms and reports, and interfacing with query languages and ____ for complex applications.

A) query wizards
B) programming languages
C) report generators
D) form screens
سؤال
In some systems, data integrity is enforced on a per transaction basis.
سؤال
Arranging data for efficient retrieval is called data organization.
سؤال
To protect against data loss caused by a database failure, accidental deletion, or other problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.
سؤال
Hashing procedures usually result in two or more records being assigned the same storage address, an event known as a collision.
سؤال
Views need to be designed to extract the needed information in as efficient a manner as possible.
سؤال
A ____ holds a single category of data (such as customer names or employee telephone numbers) that will be stored in a database.

A) cell
B) field
C) table
D) record
سؤال
Multidimensional databases are appropriate when a variety of types of objects need to be stored and retrieved.
سؤال
Data integrity refers to the accuracy of data.
سؤال
If a field needs to store decimal places, the Long Integer field size can be used.
سؤال
The data dictionary includes data located in the database tables.
سؤال
A database typically consists of interrelated tables that contain forms and reports.
سؤال
With HOLAP (Hybrid OLAP), a combination of MOLAP and ROLAP technologies are used.
سؤال
Data accessibility refers to protecting data against destruction and misuse-both intentionally and accidentally.
سؤال
IBM's DB2 9 program contains a hybrid XML / relational database server.
سؤال
Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity.
سؤال
A field is also called a ____.

A) column
B) row
C) table
D) record
سؤال
Repairing or restoring data that has become corrupt, perhaps as the result of a storage media error or computer virus, is a database analysis activity.
سؤال
  The accompanying figure shows an n-tier database model.<div style=padding-top: 35px>
The accompanying figure shows an n-tier database model.
سؤال
In ____, the table field involved in the changes is locked until the changes to that field have been completed.

A) column-level locking
B) database locking
C) row-level locking
D) record-level locking
سؤال
A(n) ____ is a small table consisting only of a list of the primary key field for each record in a table along with location information for that record.

A) tablet
B) keyword
C) index
D) main table
سؤال
A record is also called a ____.

A) field
B) report
C) row
D) table
سؤال
The field in a table that is used to relate that table to other tables is called the ____.

A) composite key
B) secondary key
C) primary key
D) primary field
سؤال
Virtually all DBMSs include a ____ for easy data input, modification, and retrieval.

A) user interface
B) line interface
C) command interface
D) device interface
سؤال
The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.

A) database book
B) data dictionary
C) data box
D) data book
سؤال
In a typical client-server database application, the client is called the ____.

A) back end
B) rear end
C) portal
D) front end
سؤال
The characteristics of an entity are called ____.

A) attributes
B) variables
C) traits
D) fields
سؤال
Individual database tables are often referred to as ____.

A) low files
B) base files
C) flat files
D) clear files
سؤال
The ____ is the most widely used database model today.

A) hierarchical database management system
B) relational database management system (RDBMS)
C) network database management system
D) database management system (DBMS)
سؤال
DBMSs available for use on personal computers include ____ and Corel Paradox.

A) IBM DB2
B) Microsoft Access
C) Adobe Acrobat
D) Adobe Fireworks
سؤال
____ is a growing concern because of the vast amounts of personal data stored in databases today and the many breaches that have occurred in the recent past.

A) Data privacy
B) Data integrity
C) Data accessibility
D) Data legibility
سؤال
____ are made up of related records.

A) Rows
B) Fields
C) Columns
D) Tables
سؤال
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.

A) records
B) rows
C) fields
D) characters
سؤال
With a ____, a database is located in its entirety on a single computer, such as a server or mainframe computer.

A) distributed database system
B) star database system
C) centralized database system
D) ring database system
سؤال
With ____, the computer uses each record's primary key field and a mathematical formula called a hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.

A) real-time organization
B) indexed organization
C) sequenced organization
D) direct organization
سؤال
A ____ is a collection of related fields.

A) table
B) field
C) column
D) record
سؤال
____ create the actual database, based on the design generated by the database designer, and get it ready for data entry.

A) Database developers
B) Database administrators (DBAs)
C) Database security officers
D) Database analysts
سؤال
One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.

A) format structure
B) input mask
C) data mask
D) data filter
سؤال
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.

A) power of two
B) prime number
C) irrational number
D) transcendental number
سؤال
If a new database is to be used with existing data, the data needs to be transferred from its existing form into the new system-a process called ____.

A) data migration
B) data conversion
C) data normalization
D) data accommodation
سؤال
Middleware for Web database applications is commonly written as ____-short sections of code written in a programming or scripting language that are executed by another program.

A) scripts
B) JavaScripts
C) applets
D) utilities
سؤال
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.

A) normalization
B) cyclic redundancy check
C) zeroing
D) zonification
سؤال
____________________ rules are used when the value of one field in the record needs to be checked against another field in that same record to be sure it is valid.
سؤال
Primary keys can be a combination of two key fields (called ____________________ primary keys), but single primary keys are more typical in simple databases.
سؤال
____________________ databases are located on a PC and are designed to be accessed by one user.
سؤال
A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.

A) form
B) query
C) macro
D) view
سؤال
The ____________________ in a database system are the ones who enter data, update data, and retrieve information from the database when necessary.
سؤال
<strong>  The figure above illustrates a ____, created from data contained in a database.</strong> A) report B) query C) form D) table <div style=padding-top: 35px>
The figure above illustrates a ____, created from data contained in a database.

A) report
B) query
C) form
D) table
سؤال
____________________ refers to the process of ensuring that the data entered into a database matches the specified type, format, and allowable value.
سؤال
To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to create a query object.

A) command
B) line
C) wizard
D) key
سؤال
In ____________________ organization, the order of the records is physically based on the content of the key field.
سؤال
____________________ entity relationships exist when one entity is related to only one other entity of a particular type.
سؤال
In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

A) VBScript
B) CGI
C) PHP
D) BasicScript
سؤال
With indexed organization, a(n) ____________________ is used to keep track of where data is stored.
سؤال
With ____, data is stored in single multidimensional database structures (sometimes called data cubes).

A) Online Analytical Processing (OLAP)
B) ROLAP (Relational OLAP)
C) MOLAP (Multidimensional OLAP)
D) HOLAP (Hybrid OLAP)
سؤال
Some database programs allow you to create a table by just entering data, and then the program will create the ____________________ based on the data entered.
سؤال
Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.

A) middleware
B) capsules
C) macros
D) applets
سؤال
____ databases are designed to store a collection of summarized data for quick and easy data analysis.

A) Relational
B) Object-oriented
C) Analytical
D) Multidimensional
سؤال
A(n) ____________________ is a specific field in a database table that uniquely identifies the records in that table.
سؤال
Explain in-memory databases
سؤال
What do database administrators do?
سؤال
Describe a database and a database management system (DBMS).
سؤال
Discuss database entities and attributes.
سؤال
The appearance and content of ____________________ Web pages change based on a user's input.
سؤال
When you are beginning to design a new database, sketching a(n) ____________________ of the reports and other desired database output can be helpful in identifying the fields that need to be included in the database.
سؤال
  In Microsoft Access, tables can be created in either Datasheet view or ____________________ view, as shown in the accompanying figure.<div style=padding-top: 35px>
In Microsoft Access, tables can be created in either Datasheet view or ____________________ view, as shown in the accompanying figure.
سؤال
____________________ script is a set of instructions written in a programming language and designed to accept data from and return data to a Web page visitor.
سؤال
____________________ usually includes the programs used with the database and the programs needed to connect the client and server components of the database system.
سؤال
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____________________.
سؤال
What is a CGI (common gateway interface) script?
سؤال
With a(n) ____________________, the data is separated into several databases, each of which is stored on a different computer that may be in different physical locations from one another but that are connected via a network.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/72
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Databases and Database Management Systems
1
Normalization is usually viewed as a multistep process, from first normal form (1NF) to usually fifth normal form (5NF).
False
2
Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as building user interfaces, creating forms and reports, and interfacing with query languages and ____ for complex applications.

A) query wizards
B) programming languages
C) report generators
D) form screens
B
3
In some systems, data integrity is enforced on a per transaction basis.
True
4
Arranging data for efficient retrieval is called data organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
5
To protect against data loss caused by a database failure, accidental deletion, or other problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
6
Hashing procedures usually result in two or more records being assigned the same storage address, an event known as a collision.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
7
Views need to be designed to extract the needed information in as efficient a manner as possible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
8
A ____ holds a single category of data (such as customer names or employee telephone numbers) that will be stored in a database.

A) cell
B) field
C) table
D) record
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
9
Multidimensional databases are appropriate when a variety of types of objects need to be stored and retrieved.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
10
Data integrity refers to the accuracy of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
11
If a field needs to store decimal places, the Long Integer field size can be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
12
The data dictionary includes data located in the database tables.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
13
A database typically consists of interrelated tables that contain forms and reports.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
14
With HOLAP (Hybrid OLAP), a combination of MOLAP and ROLAP technologies are used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
15
Data accessibility refers to protecting data against destruction and misuse-both intentionally and accidentally.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
16
IBM's DB2 9 program contains a hybrid XML / relational database server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
17
Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
18
A field is also called a ____.

A) column
B) row
C) table
D) record
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
19
Repairing or restoring data that has become corrupt, perhaps as the result of a storage media error or computer virus, is a database analysis activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
20
  The accompanying figure shows an n-tier database model.
The accompanying figure shows an n-tier database model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
21
In ____, the table field involved in the changes is locked until the changes to that field have been completed.

A) column-level locking
B) database locking
C) row-level locking
D) record-level locking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
22
A(n) ____ is a small table consisting only of a list of the primary key field for each record in a table along with location information for that record.

A) tablet
B) keyword
C) index
D) main table
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
23
A record is also called a ____.

A) field
B) report
C) row
D) table
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
24
The field in a table that is used to relate that table to other tables is called the ____.

A) composite key
B) secondary key
C) primary key
D) primary field
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
25
Virtually all DBMSs include a ____ for easy data input, modification, and retrieval.

A) user interface
B) line interface
C) command interface
D) device interface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
26
The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.

A) database book
B) data dictionary
C) data box
D) data book
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
27
In a typical client-server database application, the client is called the ____.

A) back end
B) rear end
C) portal
D) front end
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
28
The characteristics of an entity are called ____.

A) attributes
B) variables
C) traits
D) fields
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
29
Individual database tables are often referred to as ____.

A) low files
B) base files
C) flat files
D) clear files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
30
The ____ is the most widely used database model today.

A) hierarchical database management system
B) relational database management system (RDBMS)
C) network database management system
D) database management system (DBMS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
31
DBMSs available for use on personal computers include ____ and Corel Paradox.

A) IBM DB2
B) Microsoft Access
C) Adobe Acrobat
D) Adobe Fireworks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
32
____ is a growing concern because of the vast amounts of personal data stored in databases today and the many breaches that have occurred in the recent past.

A) Data privacy
B) Data integrity
C) Data accessibility
D) Data legibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
33
____ are made up of related records.

A) Rows
B) Fields
C) Columns
D) Tables
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
34
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.

A) records
B) rows
C) fields
D) characters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
35
With a ____, a database is located in its entirety on a single computer, such as a server or mainframe computer.

A) distributed database system
B) star database system
C) centralized database system
D) ring database system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
36
With ____, the computer uses each record's primary key field and a mathematical formula called a hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.

A) real-time organization
B) indexed organization
C) sequenced organization
D) direct organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
37
A ____ is a collection of related fields.

A) table
B) field
C) column
D) record
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
38
____ create the actual database, based on the design generated by the database designer, and get it ready for data entry.

A) Database developers
B) Database administrators (DBAs)
C) Database security officers
D) Database analysts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
39
One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.

A) format structure
B) input mask
C) data mask
D) data filter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
40
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.

A) power of two
B) prime number
C) irrational number
D) transcendental number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
41
If a new database is to be used with existing data, the data needs to be transferred from its existing form into the new system-a process called ____.

A) data migration
B) data conversion
C) data normalization
D) data accommodation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
42
Middleware for Web database applications is commonly written as ____-short sections of code written in a programming or scripting language that are executed by another program.

A) scripts
B) JavaScripts
C) applets
D) utilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
43
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.

A) normalization
B) cyclic redundancy check
C) zeroing
D) zonification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
44
____________________ rules are used when the value of one field in the record needs to be checked against another field in that same record to be sure it is valid.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
45
Primary keys can be a combination of two key fields (called ____________________ primary keys), but single primary keys are more typical in simple databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
46
____________________ databases are located on a PC and are designed to be accessed by one user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
47
A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.

A) form
B) query
C) macro
D) view
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
48
The ____________________ in a database system are the ones who enter data, update data, and retrieve information from the database when necessary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
49
<strong>  The figure above illustrates a ____, created from data contained in a database.</strong> A) report B) query C) form D) table
The figure above illustrates a ____, created from data contained in a database.

A) report
B) query
C) form
D) table
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
50
____________________ refers to the process of ensuring that the data entered into a database matches the specified type, format, and allowable value.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
51
To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to create a query object.

A) command
B) line
C) wizard
D) key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
52
In ____________________ organization, the order of the records is physically based on the content of the key field.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
53
____________________ entity relationships exist when one entity is related to only one other entity of a particular type.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
54
In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

A) VBScript
B) CGI
C) PHP
D) BasicScript
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
55
With indexed organization, a(n) ____________________ is used to keep track of where data is stored.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
56
With ____, data is stored in single multidimensional database structures (sometimes called data cubes).

A) Online Analytical Processing (OLAP)
B) ROLAP (Relational OLAP)
C) MOLAP (Multidimensional OLAP)
D) HOLAP (Hybrid OLAP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
57
Some database programs allow you to create a table by just entering data, and then the program will create the ____________________ based on the data entered.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
58
Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.

A) middleware
B) capsules
C) macros
D) applets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
59
____ databases are designed to store a collection of summarized data for quick and easy data analysis.

A) Relational
B) Object-oriented
C) Analytical
D) Multidimensional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
60
A(n) ____________________ is a specific field in a database table that uniquely identifies the records in that table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
61
Explain in-memory databases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
62
What do database administrators do?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
63
Describe a database and a database management system (DBMS).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
64
Discuss database entities and attributes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
65
The appearance and content of ____________________ Web pages change based on a user's input.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
66
When you are beginning to design a new database, sketching a(n) ____________________ of the reports and other desired database output can be helpful in identifying the fields that need to be included in the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
67
  In Microsoft Access, tables can be created in either Datasheet view or ____________________ view, as shown in the accompanying figure.
In Microsoft Access, tables can be created in either Datasheet view or ____________________ view, as shown in the accompanying figure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
68
____________________ script is a set of instructions written in a programming language and designed to accept data from and return data to a Web page visitor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
69
____________________ usually includes the programs used with the database and the programs needed to connect the client and server components of the database system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
70
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
71
What is a CGI (common gateway interface) script?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
72
With a(n) ____________________, the data is separated into several databases, each of which is stored on a different computer that may be in different physical locations from one another but that are connected via a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.