Group nesting 4. The Administrator and Guest user accounts are examples of C. Built-in user account 5. Which command-line tool can be used to create various object types within Active Directory? C. dsadd 6. Which input file format allows you to create, modify, and delete objects within Active Directory?
What is an attribute? Give some examples. An attribute is a property of an entity or a relationship. For example, employee id is attributing of the employee entity. 4.
Physical Design - the physical design of the database specifies the physical configuration of the database on the storage media. 3. Naming Convention - A set of rules or suggestions that promote consistency in the naming of database objects. 4. ERDs - One common method of depicting entities and relations in a diagram.
Which of the following statements is not true of file processing systems? a.|the records in one file relate to the records in other files| b.|they have redundant data| c.|they isolate data| d.|maintenance tasks consume additional time| ____ 15. Which statement does not apply to the database approach? a.|it requires less memory than file processing systems| b.|it increases the data’s integrity| c.|programs are easier and faster to develop than with a file processing system| d.|it allows nontechnical users to access and maintain data| ____ 16. Which of the following DBMSs will run only on a server or mainframe?
7. What is the difference between software RAID and hardware RAID? Hardware RAID offers better reliability compared to software RAID. A software RAID can be prone to data corruption, due to the fault of the RAID software or driver that is being used. A software RAID can also be affected if the host computer is heavily loaded.
[f] P146 _______ 4. User logon scripts are applied in this manner. [b] P149 _______ 5. These are used to define registry-based policy settings in the User Configuration and Computer Configuration nodes. [a] P146 _______ 6.
(TCO 8) A programmer makes a connection between a Visual Basic application and a database using the _____. (Points : 5) Database Integration tool data box control Data Source Configuration Wizard Dataset Designer Question 14.14. (TCO 9) The components of a two-tier architecture are _____. (Points : 5) the primary and the secondary the client and the server the master and the subordinate the alpha and the beta Question 1. 1.
PRG 211 WEEK 3 Supporting Activities Software Program Control Flow * What is sequential flow of a program? * What is branching within a program? * How is branching controlled? * What is the role of an IF statement in control structures? Sequential flow of a program refers to the order in which the individual statements, instructions, or function calls of an imperative or a declarative program are executed or evaluated.
The Windows 7 command-line utility that can tell you if the TCP/IP stack of another system on the network is functioning normally is called Ping.exe. 7. The Windows 7 command-line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called Nslookup.exe. 8. Most networks use Dynamic Host Configuration Protocol to dynamically assign addresses and configure computers to use them.
LO8: Determine program input, processing, and output stages. LO9: Create the necessary flowcharts to describe a program’s structure. LO10: Use pseudocode to define a program’s structure.