Deck 11: Building Solutions
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/86
Play
Full screen (f)
Deck 11: Building Solutions
1
Many programs today use ______ on a webpage as their front end.
A) landing pages
B) PDF documents
C) forms
D) spreadsheets
A) landing pages
B) PDF documents
C) forms
D) spreadsheets
C
2
QBE stands for query by ______.
A) example
B) entry
C) edit
D) email
A) example
B) entry
C) edit
D) email
A
3
The field ______ defines the maximum number of characters a field can contain.
A) length
B) width
C) capacity
D) size
A) length
B) width
C) capacity
D) size
D
4
A(n) ______ database stores data in tables that consist of rows and columns.
A) multidimensional
B) relational
C) data warehouse
D) distributed
A) multidimensional
B) relational
C) data warehouse
D) distributed
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ______ is an item that contains data, as well as the actions that read or process the data.
A) table
B) field
C) record
D) object
A) table
B) field
C) record
D) object
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
6
A(n) ______ database is a huge database used to analyze transactions.
A) object-oriented
B) relational
C) data warehouse
D) distributed
A) object-oriented
B) relational
C) data warehouse
D) distributed
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
7
______ compares data with a set of rules or values to determine if the data meets certain criteria.
A) Evaluation
B) Processing
C) Analysis
D) Validation
A) Evaluation
B) Processing
C) Analysis
D) Validation
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
8
A(n) ______ is the smallest unit of data a user accesses.
A) record
B) file
C) field
D) symbol
A) record
B) file
C) field
D) symbol
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
9
In a(n) ______, the DBMS uses the log to reenter changes made since the last save or backup.
A) rollforward
B) partial restore
C) backward recovery
D) retroactive backup
A) rollforward
B) partial restore
C) backward recovery
D) retroactive backup
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
10
During which phase of system development would you acquire any necessary hardware and software?
A) Planning
B) Analysis
C) Design
D) Implementation
A) Planning
B) Analysis
C) Design
D) Implementation
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
11
In some database programs, a data file is referred to as a(n) ______.
A) table
B) unit
C) record
D) sheet
A) table
B) unit
C) record
D) sheet
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
12
Some web databases are ______ databases, where users store and share media with other registered users.
A) collaborative
B) wiki
C) synergic
D) combination
A) collaborative
B) wiki
C) synergic
D) combination
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
13
______ data is stored in separate files in different departments.
A) Isolated
B) Exiled
C) Detached
D) Divorced
A) Isolated
B) Exiled
C) Detached
D) Divorced
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
14
A Yes/No data type also is called ______.
A) Boolean
B) optional
C) choice
D) either/or
A) Boolean
B) optional
C) choice
D) either/or
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
15
Which data type sometimes is called BLOB?
A) Number
B) Object
C) Memo
D) Yes/No
A) Number
B) Object
C) Memo
D) Yes/No
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
16
File ______ refers to the procedures that keep data current.
A) administration
B) maintenance
C) integrity
D) validation
A) administration
B) maintenance
C) integrity
D) validation
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
17
A data ______ contains data about each file in the database and each field in those files.
A) encyclopedia
B) reference
C) guide
D) dictionary
A) encyclopedia
B) reference
C) guide
D) dictionary
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
18
Experian, Equifax, and Transunion are all types of ______ companies.
A) financial planning
B) stock exchange
C) credit reporting
D) security
A) financial planning
B) stock exchange
C) credit reporting
D) security
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
19
A(n) ______ is a number(s) or character(s) appended to or inserted in a primary key value.
A) validator
B) value-add
C) address
D) check digit
A) validator
B) value-add
C) address
D) check digit
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
20
During which phase of system development would you develop any necessary programs and apps?
A) Planning
B) Analysis
C) Design
D) Implementation
A) Planning
B) Analysis
C) Design
D) Implementation
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
21
COGNITIVE ASSESSMENT Which of the following best defines big data?
A) Large-scale data sets that require advanced technologies
B) A database that specializes in calculating large numbers
C) Fields capable of storing multiple gigabytes of information
D) Data accessible by large groups of users
A) Large-scale data sets that require advanced technologies
B) A database that specializes in calculating large numbers
C) Fields capable of storing multiple gigabytes of information
D) Data accessible by large groups of users
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is another term for a JAD session?
A) steering committee
B) web conference
C) programming phase
D) focus group
A) steering committee
B) web conference
C) programming phase
D) focus group
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
23
COGNITIVE ASSESSMENT Which of the following is NOT one of the three general guidelines for system development?
A) Create documentation
B) Group activities into phases
C) Involve users
D) Define standards
A) Create documentation
B) Group activities into phases
C) Involve users
D) Define standards
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
24
A(n) ______ translates and executes one instruction at a time and converts it to machine language.
A) compiler
B) interpreter
C) executor
D) translator
A) compiler
B) interpreter
C) executor
D) translator
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
25
Critical Thinking Questions Case 11-1
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor.
Gregor tells you that when a DBMS flags a deleted record, ______.
A) it is deleted logically
B) it is removed physically from the drive
C) it means the data is invalid
D) nothing happens -- records cannot be deleted
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor.
Gregor tells you that when a DBMS flags a deleted record, ______.
A) it is deleted logically
B) it is removed physically from the drive
C) it means the data is invalid
D) nothing happens -- records cannot be deleted
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
26
Critical Thinking Questions Case 11-2
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data.
Which of the following is NOT one of the three V's of Big Data.
A) Volatility
B) Volume
C) Velocity
D) Variety
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data.
Which of the following is NOT one of the three V's of Big Data.
A) Volatility
B) Volume
C) Velocity
D) Variety
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is NOT true about OOP languages?
A) A disadvantage of OOP is that you cannot reuse or modify existing objects.
B) An IDE contains tools for building GUIs, editor, a compiler and/or interpreter, and a debugger.
C) An object represents a real person, place, event, or transaction.
D) Java and C++ are examples of OOP languages.
A) A disadvantage of OOP is that you cannot reuse or modify existing objects.
B) An IDE contains tools for building GUIs, editor, a compiler and/or interpreter, and a debugger.
C) An object represents a real person, place, event, or transaction.
D) Java and C++ are examples of OOP languages.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
28
Critical Thinking Questions Case 11-1
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor.
Gregor tells you that a(n) ______ check verifies that a required field contains data.
A) integration
B) completeness
C) processing
D) entirety
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor.
Gregor tells you that a(n) ______ check verifies that a required field contains data.
A) integration
B) completeness
C) processing
D) entirety
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
29
COGNITIVE ASSESSMENT Which of the following is NOT true about web application development?
A) HTML uses a set of codes called tags to instruct a browser how to structure content.
B) Some computers and mobile devices do not support HTML5 but instead rely on Flash.
C) CSS allows web designers to separate the code that specifies content from code that specifies appearance.
D) JavaScript can be used to display alert messages or windows.
A) HTML uses a set of codes called tags to instruct a browser how to structure content.
B) Some computers and mobile devices do not support HTML5 but instead rely on Flash.
C) CSS allows web designers to separate the code that specifies content from code that specifies appearance.
D) JavaScript can be used to display alert messages or windows.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
30
Detailed analysis sometimes is called ______ design.
A) logical
B) practical
C) predictive
D) virtual
A) logical
B) practical
C) predictive
D) virtual
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
31
COGNITIVE ASSESSMENT Which of the following is NOT an advantage of the database approach?
A) Eliminates redundant data
B) Improved data integrity
C) Easier access
D) Reduced development time
A) Eliminates redundant data
B) Improved data integrity
C) Easier access
D) Reduced development time
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
32
COGNITIVE ASSESSMENT Which of the following best describes function creep?
A) When a user accesses data without authorization
B) When spyware collects and transmits data from a database
C) When a company uses the technology intended for one purpose for a different purpose
D) When a project's features keep being added to during development
A) When a user accesses data without authorization
B) When spyware collects and transmits data from a database
C) When a company uses the technology intended for one purpose for a different purpose
D) When a project's features keep being added to during development
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
33
COGNITIVE ASSESSMENT Which of the following is NOT an activity in the implementation phase?
A) Develop programs and apps
B) Install and test the new system
C) Solicit vendor proposals
D) Convert to the new system
A) Develop programs and apps
B) Install and test the new system
C) Solicit vendor proposals
D) Convert to the new system
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
34
COGNITIVE ASSESSMENT Why would a field that contains numbers have a text data type?
A) Because the values will not be used in calculations.
B) It shouldn't -- this is a mistake that should be fixed.
C) Because the numbers represent letters.
D) In order to keep the number of data types to a minimum.
A) Because the values will not be used in calculations.
B) It shouldn't -- this is a mistake that should be fixed.
C) Because the numbers represent letters.
D) In order to keep the number of data types to a minimum.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
35
COGNITIVE ASSESSMENT Which of the following best describes the function of a primary key?
A) The first record in a data file
B) Another term for file name
C) To uniquely identify each record in a file
D) To provide decryption of data
A) The first record in a data file
B) Another term for file name
C) To uniquely identify each record in a file
D) To provide decryption of data
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
36
COGNITIVE ASSESSMENT Which of the following best describes the principle of least privilege?
A) Database restrictions should be lifted in order to allow all users to contribute to data integrity.
B) Users' access privileges are limited to the lowest level necessary perform required tasks.
C) Data entry is done using a back end.
D) Users should not share access details with colleagues.
A) Database restrictions should be lifted in order to allow all users to contribute to data integrity.
B) Users' access privileges are limited to the lowest level necessary perform required tasks.
C) Data entry is done using a back end.
D) Users should not share access details with colleagues.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
37
Agile development guidelines emphasize adaptation of goals and continuous improvement of the software or app.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
38
A(n) ______ test measures the performance of hardware or software.
A) evaluation
B) analysis
C) touchstone
D) benchmark
A) evaluation
B) analysis
C) touchstone
D) benchmark
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
39
Critical Thinking Questions Case 11-2
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data.
Data ______ is the process of presenting data graphically as charts, maps, or other pictorial formats.
A) illustration
B) visualization
C) art
D) drawing
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data.
Data ______ is the process of presenting data graphically as charts, maps, or other pictorial formats.
A) illustration
B) visualization
C) art
D) drawing
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
40
Gantt and PERT are types of ______ used to plan and schedule time relationships among project activities.
A) apps
B) charts
C) deliverables
D) documents
A) apps
B) charts
C) deliverables
D) documents
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
41
When an organization uses the database approach, many programs and users share the data in the database.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
42
A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
43
In a typical file processing system, each department or area within an organization has its own set of files.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
44
HTML is a programming language.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
45
Eight bytes grouped together form a bit.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
46
A composite key consists on multiple fields.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
47
A DBMS uses the data dictionary to perform validation checks.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
48
A back end is a program that generally has a more user-friendly interface than the DBMS.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
49
With the database approach, the data is independent of the programs that access the data.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
50
An object data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
51
Megan's Law refers to a group of U.S. laws that require law enforcement agencies to share information in a national database about criminals who commit unlawful acts on children.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
52
A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
53
Census records, stock values, and corporate sales data is structured.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
54
Unlike a form, you use a report writer only to retrieve data.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
55
A relational database can store more than two dimensions of data.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
56
Continuous backup is inexpensive because the data is constantly being backed up.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
57
Database software is another term for a DBMS.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
58
FIP addresses concerns regarding security of information protocols.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
59
A numeric check determines whether a number is within a specified range.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
60
File processing systems require more memory and processing power than databases.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
61
Because the data dictionary contains details about data, some call it ______.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
62
The collection of biometric and other data used in criminal investigation is called digital ______.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
63
A(n) ______is a series of statements that instructs a program or app how to complete a task.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
64
With a(n) ______ language, a software developer writers instructions using English-like words that tell the computer what to accomplish and how to do it.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
65
The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
66
A data ______ is a stored collection of related records.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
67
A(n) ______ is a separate program that converts the entire source program into machine language before executing it.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
68
Each programming language has its own rules, or ______, for writing instructions.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
69
A(n) ______ is a group of related fields.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
70
Monitoring system performance is a part of the support and security phase.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
71
A(n) ______ is a window on the screen that provides areas for entering or modifying data in a database.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
72
To add interactivity on webpages, web developers write small programs called ______.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
73
More complex DBMSs maintain a(n) ______, which is a listing of activities that modify the contents of the database.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
74
A(n) ______ is a request for specific data from the database.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
75
With a direct conversion, only one location in the organization uses the new system, so that it can be tested.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
76
A data ______ defines how users view the organization of the data.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
77
A(n) ______ is a combination of one or more related characters or bytes.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
78
The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
79
List and describe common data types.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
80
A(n) ______ is a collection of data organized in a manner that allows access, retrieval, and use of that data.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck