- Agile development guidelines emphasize adaptation of goals and continuous improvement of the software or app.
Answer: True - A(n) is a number(s) or character(s) appended to or inserted in a primary key value.
- address
- validator
- value-add
- check digit
- A(n) test measures the performance of hardware or software.
- benchmark
- touchstone
- evaluation
- analysis
- A(n) is a collection of data organized in a manner that allows access, retrieval, and use of that data.
Answer: database - A back end is a program that generally has a more user-friendly interface than the DBMS.
Answer: False - A data is a stored collection of related records.
Answer: file - The collection of biometric and other data used in criminal investigation is called digital .
Answer: forensics - With a(n) language, a software developer writers instructions using English-like words that tell the computer what to accomplish and how to do it.
Answer: procedural - Megan’s Law refers to a group of U.S. laws that require law enforcement agencies to share information in a national database about criminals who commit unlawful acts on children.
Answer: True - You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data.
Which of the following is NOT one of the three V’s of Big Data.
- Volatility
- Volume
- Variety
- Velocity
- Which of the following is NOT an activity in the implementation phase?
- Develop programs and apps
- Install and test the new system
- Solicit vendor proposals
- Convert to the new system
- In a typical file processing system, each department or area within an organization has its own set of files.
Answer: True - Identify the letter of the choice that best matches the phrase or definition.
- A working model of the proposed system’s essential functionality
Answer: a. proof of concept - A group of related fields
Answer: i. record - Has special keywords and rules that users include in statements
Answer: k. SQL - Verifies that an application works with other applications
Answer: d. integration test - The collection and summarization of data, information, and deliverables
Answer: g. documentation - What each byte represents in ASCII
Answer: h. character - A measure of how suitable the development of a system will be to the organization
Answer: l. feasibility - A field that uniquely identifies each record in a file
Answer: j. primary key - Kind of rules that decrease data entry errors, and thus enhance the data’s integrity
Answer: n. validation - Performed by end users and checks the new system to ensure that it works
with actual data
Answer: e. acceptance test - While a user is working with the database, this resides in the memory of the computer.
Answer: o. DBMS - The smallest unit of data a user accesses
Answer: f. field - Whether designed for a small or large computer, most DBMSs perform common ones.
Answer: c. systems test - Verifies that each individual program or object works by itself
Answer: b. unit test - This database capability is one of the more powerful database features.
Answer: m. querying
- A working model of the proposed system’s essential functionality
- Some web databases are databases, where users store and share media with other registered users.
- wiki
- combination
- synergic
- collaborative
- A(n) is the smallest unit of data a user accesses.
- file
- symbol
- field
- record
- A(n) is an item that contains data, as well as the actions that read or process the data.
- field
- record
- object
- table
- When an organization uses the database approach, many programs and users share the data in the database.
Answer: True - A data contains data about each file in the database and each field in those files.
- dictionary
- guide
- reference
- encyclopedia
- HTML is a programming language.
Answer: False - Census records, stock values, and corporate sales data is structured.
Answer: True - A(n) database stores data in tables that consist of rows and columns.
- multidimensional
- distributed
- relational
- data warehouse
- Unlike a form, you use a report writer only to retrieve data.
Answer: True - Experian, Equifax, and Transunion are all types of companies.
- security
- financial planning
- stock exchange
- credit reporting
- With a direct conversion, only one location in the organization uses the new system, so that it can be tested.
Answer: False - A numeric check determines whether a number is within a specified range.
Answer: False - Why would a field that contains numbers have a text data type?
- It shouldn’t — this is a mistake that should be fixed.
- Because the values will not be used in calculations.
- Because the numbers represent letters.
- In order to keep the number of data types to a minimum.
- compares data with a set of rules or values to determine if the data meets certain criteria.
- Validation
- Processing
- Evaluation
- Analysis
- A DBMS uses the data dictionary to perform validation checks.
Answer: True - More complex DBMSs maintain a(n) , which is a listing of activities that modify the contents of the database.
Answer: log - A(n) is a request for specific data from the database.
Answer: query - Which of the following best defines big data?
- Data accessible by large groups of users
- Fields capable of storing multiple gigabytes of information
- Large-scale data sets that require advanced technologies
- A database that specializes in calculating large numbers
- The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs.
Answer: True - Which of the following is NOT an advantage of the database approach?
- Improved data integrity
- Reduced development time
- Eliminates redundant data
- Easier access
- Which of the following best describes the function of a primary key?
- To provide decryption of data
- The first record in a data file
- Another term for file name
- To uniquely identify each record in a file
- A(n) is a combination of one or more related characters or bytes.
Answer: field - A composite key consists on multiple fields.
Answer: True - Database software is another term for a DBMS.
Answer: True - Monitoring system performance is a part of the support and security phase.
Answer: True - A(n) is a series of statements that instructs a program or app how to complete a task.
Answer: macro - A data defines how users view the organization of the data.
Answer: model - In a(n) , the DBMS uses the log to reenter changes made since the last save or backup.
- rollforward
- backward recovery
- retroactive backup
- partial restore
- Which of the following is NOT true about web application development?
- CSS allows web designers to separate the code that specifies content from code that specifies appearance.
- JavaScript can be used to display alert messages or windows.
- HTML uses a set of codes called tags to instruct a browser how to structure content.
- Some computers and mobile devices do not support HTML5 but instead rely on Flash.
- Many programs today use on a webpage as their front end.
- PDF documents
- landing pages
- spreadsheets
- forms
- A relational database can store more than two dimensions of data.
Answer: False - You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data.
Data is the process of presenting data graphically as charts, maps, or other pictorial formats.
- drawing
- art
- visualization
- illustration
- Which of the following is another term for a JAD session?
- focus group
- web conference
- programming phase
- steering committee
- During which phase of system development would you develop any necessary programs and apps?
- Planning
- Analysis
- Design
- Implementation
- Detailed analysis sometimes is called design.
- practical
- virtual
- predictive
- logical
- Which of the following is NOT true about OOP languages?
- An IDE contains tools for building GUIs, editor, a compiler and/or interpreter, and a debugger.
- Java and C++ are examples of OOP languages.
- A disadvantage of OOP is that you cannot reuse or modify existing objects.
- An object represents a real person, place, event, or transaction.
- A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format.
Answer: True - An object data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image.
Answer: False - FIP addresses concerns regarding security of information protocols.
Answer: False - The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications.
Answer: True - Gantt and PERT are types of used to plan and schedule time relationships among project activities.
- charts
- apps
- deliverables
- documents
- File processing systems require more memory and processing power than databases.
Answer: False - In some database programs, a data file is referred to as a(n) .
- record
- sheet
- unit
- table
- You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor.
Gregor tells you that when a DBMS flags a deleted record, .
- it is removed physically from the drive
- nothing happens — records cannot be deleted
- it is deleted logically
- it means the data is invalid
- A(n) is a group of related fields.
Answer: record - Which of the following best describes the principle of least privilege?
- Users should not share access details with colleagues.
- Database restrictions should be lifted in order to allow all users to contribute to data integrity.
- Users’ access privileges are limited to the lowest level necessary perform required tasks.
- Data entry is done using a back end.
- You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor.
Gregor tells you that a(n) check verifies that a required field contains data.
- integration
- processing
- completeness
- entirety
- With the database approach, the data is independent of the programs that access the data.
Answer: True - Each programming language has its own rules, or , for writing instructions.
Answer: syntax - During which phase of system development would you acquire any necessary hardware and software?
- Planning
- Analysis
- Design
- Implementation
- data is stored in separate files in different departments.
- Isolated
- Detached
- Divorced
- Exiled
- QBE stands for query by .
- edit
- example
- entry
- A(n) translates and executes one instruction at a time and converts it to machine language.
- compiler
- executor
- translator
- interpreter
- Which data type sometimes is called BLOB?
- Yes/No
- Object
- Memo
- Number
- Eight bytes grouped together form a bit.
Answer: False - A(n) is a window on the screen that provides areas for entering or modifying data in a database.
Answer: form - The field defines the maximum number of characters a field can contain.
- width
- length
- size
- capacity
- Which of the following is NOT one of the three general guidelines for system development?
- Involve users
- Define standards
- Create documentation
- Group activities into phases
- Continuous backup is inexpensive because the data is constantly being backed up.
Answer: False - A(n) is a separate program that converts the entire source program into machine language before executing it.
Answer: compiler - A(n) database is a huge database used to analyze transactions.
- data warehouse
- object-oriented
- distributed
- relational
- A Yes/No data type also is called .
- either/or
- optional
- choice
- Boolean
- A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete.
Answer: False - To add interactivity on webpages, web developers write small programs called .
Answer: scripts - File refers to the procedures that keep data current.
- integrity
- maintenance
- administration
- validation
- Because the data dictionary contains details about data, some call it .
Answer: metadata - Which of the following best describes function creep?
- When a company uses the technology intended for one purpose for a different purpose
- When a user accesses data without authorization
- When a project’s features keep being added to during development
- When spyware collects and transmits data from a database