BUR410FALL2010HW56NA - BUR410, Home Work, Chapeters 5, 6...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
BUR410, Home Work, Chapeters 5, 6 Name___________________________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) A field identified in a record as holding the unique identifier for that record is called the 1) A) primary key. B) key field. C) primary field. D) unique ID. 2) Software that manages the resources of the computer is called 2) A) operating system software. B) application software. C) data management software. D) network software. 3) An example of autonomic computing is 3) A) spyware protection software that runs and updates itself automatically. B) software programmed to run on any hardware platform. C) cell phones taking on the functions of handheld computers. D) programming languages that allow non - programmers to create custom applications. 4) Duplicate data in multiple data files is called data ________. 4) A) redundancy B) repetition C) independence D) partitions 5) SaaS refers to 5) A) supplying online access over networks to storage devices and storage area network technology. B) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. C) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis. D) none of the above. 6) Which of the following is a technique used to allow users to interact with a Web page without having to wait for the Web server to reload the Web page? 6) A) UDDI B) widgets C) Ajax D) Java 7) A DBMS reduces data redundancy and inconsistency by 7) A) enforcing referential integrity. B) uncoupling program and data. C) utilizing a data dictionary. D) minimizing isolated files with repeated data. 8) Specifications that establish the compatibility of products and the ability to communicate in a network are called 8) A) network standards. B) telecommunications standards. C) technology standards. D) Internet standards. 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
9) DBMS for midrange computers include all of the following EXCEPT 9) A) DB2. B) Oracle. C)
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/23/2011 for the course OM 300 taught by Professor Bobsanders during the Spring '11 term at Essex County College.

Page1 / 5

BUR410FALL2010HW56NA - BUR410, Home Work, Chapeters 5, 6...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online