Module 11: Building Solutions

  1. Agile development guidelines emphasize adaptation of goals and continuous improvement of the software or app.
    Answer: True
  2. A(n) is a number(s) or character(s) appended to or inserted in a primary key value.
    1. address
    2. validator
    3. value-add
    4. check digit
  3. A(n) test measures the performance of hardware or software.
    1. benchmark
    2. touchstone
    3. evaluation
    4. analysis
  4. A(n) is a collection of data organized in a manner that allows access, retrieval, and use of that data.
    Answer: database
  5. A back end is a program that generally has a more user-friendly interface than the DBMS.
    Answer: False
  6. A data is a stored collection of related records.
    Answer: file
  7. The collection of biometric and other data used in criminal investigation is called digital .
    Answer: forensics
  8. With a(n) language, a software developer writers instructions using English-like words that tell the computer what to accomplish and how to do it.
    Answer: procedural
  9. Megan’s Law refers to a group of U.S. laws that require law enforcement agencies to share information in a national database about criminals who commit unlawful acts on children.
    Answer: True
  10. You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data.

    Which of the following is NOT one of the three V’s of Big Data.

    1. Volatility
    2. Volume
    3. Variety
    4. Velocity
  11. Which of the following is NOT an activity in the implementation phase?
    1. Develop programs and apps
    2. Install and test the new system
    3. Solicit vendor proposals
    4. Convert to the new system
  12. In a typical file processing system, each department or area within an organization has its own set of files.
    Answer: True
  13. Identify the letter of the choice that best matches the phrase or definition.
    1. A working model of the proposed system’s essential functionality
      Answer: a. proof of concept
    2. A group of related fields
      Answer: i. record
    3. Has special keywords and rules that users include in statements
      Answer: k. SQL
    4. Verifies that an application works with other applications
      Answer: d. integration test
    5. The collection and summarization of data, information, and deliverables
      Answer: g. documentation
    6. What each byte represents in ASCII
      Answer: h. character
    7. A measure of how suitable the development of a system will be to the organization
      Answer: l. feasibility
    8. A field that uniquely identifies each record in a file
      Answer: j. primary key
    9. Kind of rules that decrease data entry errors, and thus enhance the data’s integrity
      Answer: n. validation
    10. Performed by end users and checks the new system to ensure that it works
      with actual data
      Answer: e. acceptance test
    11. While a user is working with the database, this resides in the memory of the computer.
      Answer: o. DBMS
    12. The smallest unit of data a user accesses
      Answer: f. field
    13. Whether designed for a small or large computer, most DBMSs perform common ones.
      Answer: c. systems test
    14. Verifies that each individual program or object works by itself
      Answer: b. unit test
    15. This database capability is one of the more powerful database features.
      Answer: m. querying
  14. Some web databases are databases, where users store and share media with other registered users.
    1. wiki
    2. combination
    3. synergic
    4. collaborative
  15. A(n) is the smallest unit of data a user accesses.
    1. file
    2. symbol
    3. field
    4. record
  16. A(n) is an item that contains data, as well as the actions that read or process the data.
    1. field
    2. record
    3. object
    4. table
  17. When an organization uses the database approach, many programs and users share the data in the database.
    Answer: True
  18. A data contains data about each file in the database and each field in those files.
    1. dictionary
    2. guide
    3. reference
    4. encyclopedia
  19. HTML is a programming language.
    Answer: False
  20. Census records, stock values, and corporate sales data is structured.
    Answer: True
  21. A(n) database stores data in tables that consist of rows and columns.
    1. multidimensional
    2. distributed
    3. relational
    4. data warehouse
  22. Unlike a form, you use a report writer only to retrieve data.
    Answer: True
  23. Experian, Equifax, and Transunion are all types of companies.
    1. security
    2. financial planning
    3. stock exchange
    4. credit reporting
  24. With a direct conversion, only one location in the organization uses the new system, so that it can be tested.
    Answer: False
  25. A numeric check determines whether a number is within a specified range.
    Answer: False
  26. Why would a field that contains numbers have a text data type?
    1. It shouldn’t — this is a mistake that should be fixed.
    2. Because the values will not be used in calculations.
    3. Because the numbers represent letters.
    4. In order to keep the number of data types to a minimum.
  27. compares data with a set of rules or values to determine if the data meets certain criteria.
    1. Validation
    2. Processing
    3. Evaluation
    4. Analysis
  28. A DBMS uses the data dictionary to perform validation checks.
    Answer: True
  29. More complex DBMSs maintain a(n) , which is a listing of activities that modify the contents of the database.
    Answer: log
  30. A(n) is a request for specific data from the database.
    Answer: query
  31. Which of the following best defines big data?
    1. Data accessible by large groups of users
    2. Fields capable of storing multiple gigabytes of information
    3. Large-scale data sets that require advanced technologies
    4. A database that specializes in calculating large numbers
  32. The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs.
    Answer: True
  33. Which of the following is NOT an advantage of the database approach?
    1. Improved data integrity
    2. Reduced development time
    3. Eliminates redundant data
    4. Easier access
  34. Which of the following best describes the function of a primary key?
    1. To provide decryption of data
    2. The first record in a data file
    3. Another term for file name
    4. To uniquely identify each record in a file
  35. A(n) is a combination of one or more related characters or bytes.
    Answer: field
  36. A composite key consists on multiple fields.
    Answer: True
  37. Database software is another term for a DBMS.
    Answer: True
  38. Monitoring system performance is a part of the support and security phase.
    Answer: True
  39. A(n) is a series of statements that instructs a program or app how to complete a task.
    Answer: macro
  40. A data defines how users view the organization of the data.
    Answer: model
  41. In a(n) , the DBMS uses the log to reenter changes made since the last save or backup.
    1. rollforward
    2. backward recovery
    3. retroactive backup
    4. partial restore
  42. Which of the following is NOT true about web application development?
    1. CSS allows web designers to separate the code that specifies content from code that specifies appearance.
    2. JavaScript can be used to display alert messages or windows.
    3. HTML uses a set of codes called tags to instruct a browser how to structure content.
    4. Some computers and mobile devices do not support HTML5 but instead rely on Flash.
  43. Many programs today use on a webpage as their front end.
    1. PDF documents
    2. landing pages
    3. spreadsheets
    4. forms
  44. A relational database can store more than two dimensions of data.
    Answer: False
  45. You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data.

    Data is the process of presenting data graphically as charts, maps, or other pictorial formats.

    1. drawing
    2. art
    3. visualization
    4. illustration
  46. Which of the following is another term for a JAD session?
    1. focus group
    2. web conference
    3. programming phase
    4. steering committee
  47. During which phase of system development would you develop any necessary programs and apps?
    1. Planning
    2. Analysis
    3. Design
    4. Implementation
  48. Detailed analysis sometimes is called design.
    1. practical
    2. virtual
    3. predictive
    4. logical
  49. Which of the following is NOT true about OOP languages?
    1. An IDE contains tools for building GUIs, editor, a compiler and/or interpreter, and a debugger.
    2. Java and C++ are examples of OOP languages.
    3. A disadvantage of OOP is that you cannot reuse or modify existing objects.
    4. An object represents a real person, place, event, or transaction.
  50. A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format.
    Answer: True
  51. An object data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image.
    Answer: False
  52. FIP addresses concerns regarding security of information protocols.
    Answer: False
  53. The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications.
    Answer: True
  54. Gantt and PERT are types of used to plan and schedule time relationships among project activities.
    1. charts
    2. apps
    3. deliverables
    4. documents
  55. File processing systems require more memory and processing power than databases.
    Answer: False
  56. In some database programs, a data file is referred to as a(n) .
    1. record
    2. sheet
    3. unit
    4. table
  57. You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor.

    Gregor tells you that when a DBMS flags a deleted record, .

    1. it is removed physically from the drive
    2. nothing happens — records cannot be deleted
    3. it is deleted logically
    4. it means the data is invalid
  58. A(n) is a group of related fields.
    Answer: record
  59. Which of the following best describes the principle of least privilege?
    1. Users should not share access details with colleagues.
    2. Database restrictions should be lifted in order to allow all users to contribute to data integrity.
    3. Users’ access privileges are limited to the lowest level necessary perform required tasks.
    4. Data entry is done using a back end.
  60. You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor.

    Gregor tells you that a(n) check verifies that a required field contains data.

    1. integration
    2. processing
    3. completeness
    4. entirety
  61. With the database approach, the data is independent of the programs that access the data.
    Answer: True
  62. Each programming language has its own rules, or , for writing instructions.
    Answer: syntax
  63. During which phase of system development would you acquire any necessary hardware and software?
    1. Planning
    2. Analysis
    3. Design
    4. Implementation
  64. data is stored in separate files in different departments.
    1. Isolated
    2. Detached
    3. Divorced
    4. Exiled
  65. QBE stands for query by .
    1. email
    2. edit
    3. example
    4. entry
  66. A(n) translates and executes one instruction at a time and converts it to machine language.
    1. compiler
    2. executor
    3. translator
    4. interpreter
  67. Which data type sometimes is called BLOB?
    1. Yes/No
    2. Object
    3. Memo
    4. Number
  68. Eight bytes grouped together form a bit.
    Answer: False
  69. A(n) is a window on the screen that provides areas for entering or modifying data in a database.
    Answer: form
  70. The field defines the maximum number of characters a field can contain.
    1. width
    2. length
    3. size
    4. capacity
  71. Which of the following is NOT one of the three general guidelines for system development?
    1. Involve users
    2. Define standards
    3. Create documentation
    4. Group activities into phases
  72. Continuous backup is inexpensive because the data is constantly being backed up.
    Answer: False
  73. A(n) is a separate program that converts the entire source program into machine language before executing it.
    Answer: compiler
  74. A(n) database is a huge database used to analyze transactions.
    1. data warehouse
    2. object-oriented
    3. distributed
    4. relational
  75. A Yes/No data type also is called .
    1. either/or
    2. optional
    3. choice
    4. Boolean
  76. A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete.
    Answer: False
  77. To add interactivity on webpages, web developers write small programs called .
    Answer: scripts
  78. File refers to the procedures that keep data current.
    1. integrity
    2. maintenance
    3. administration
    4. validation
  79. Because the data dictionary contains details about data, some call it .
    Answer: metadata
  80. Which of the following best describes function creep?
    1. When a company uses the technology intended for one purpose for a different purpose
    2. When a user accesses data without authorization
    3. When a project’s features keep being added to during development
    4. When spyware collects and transmits data from a database

Leave a Reply

Thumbnails managed by ThumbPress