This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: https://original-oncourse.iu.edu/...nse&testID=15659&classID=2009%2D8%2DIN%2DBUS%2DK201%2D14845&classTitle=[4/11/2010 12:43:29 PM] Concepts Exam 2 Points Possible 100 Points Earned 90 Points Missed 10 Points Ungraded Score 90.0% 10. Database Management [DC 2008] 1. In a database, a(n) _____ is a group of related fields. A. table B. key C. record D. primary field Points: 1 / 1 2. If the lowest annual fee at a discount warehouse is $20.25 and the highest is $55.50, a(n) _____ on the Annual Fee field ensures it is a value between $20.25 and $55.50. A. range check B. completeness check C. consistency check D. alphabetic/numeric check Points: 1 / 1 3. Most DBMSs include a(n) _____ feature, like the one in Figure 10- 4, which has a graphical user interface to assist users with retrieving data. A. QBA B. SQL C. QBE D. schema Points: 1 / 1 4. In a relational database, such as that pictured in Figure 10-1, users can set up a relationship between tables at any time, but the tables must have a common A. record B. row C. column D. key Points: 0 / 1 5. Timely information A. can be proven as correct of incorrect. B. has an age suited to its use. C. gives more value than it costs to produce. D. is error free. Points: 1 / 1 6. Popular data models in use today include all of the following except A. relational B. hierarchical C. object-oriented D. multidimensional Points: 1 / 1 https://original-oncourse.iu.edu/...nse&testID=15659&classID=2009%2D8%2DIN%2DBUS%2DK201%2D14845&classTitle=[4/11/2010 12:43:29 PM] 7. _____ is a process designed to ensure the data within the relations (tables) contains the least amount of duplication. A. Concatenation B. Rasterization C. Dithering D. Normalization Points: 1 / 1 8. In a relational database, each row A. and each column has a primary key B. has a unique name and each column has a primary key C. has a primary key and each column has a unique name D. and each column has a unique name Points: 1 / 1 9. _____ is a common data type that consists of lengthy text entries. A. Numeric B. Memo C. Object D. Date Points: 1 / 1 10. A checkout clerk with _____ privileges to the e-mail addresses in a discount warehouse database could view the addresses but not change them. A. read-only B. write-only C. full-update D. no access Points: 1 / 1 11. Computer Security, Ethics, and Privacy [DC 2008] 11. A _____ is a separate area of a hard disk that holds an infected file until the infection can be removed. A. quarantine B. payload C. firewall D. honeypot Points: 1 / 1 12. The _____ is the destructive event or prank a malicious-logic program is intended to deliver. A. zombie B. hash C. cracker D. payload Points: 0 / 1 13. A(n) _____ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e- mail....
View Full Document
This note was uploaded on 04/11/2010 for the course BUS K 201 taught by Professor M.nemeth during the Spring '09 term at IUPUI.
- Spring '09