CS200-Chapter9-Homework Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. A(n) ____ is a collection of data organized in a manner that allows access, retrieval, and use of that data. a.|database|c.|spreadsheet| b.|server|d.|webbase| ____ 2. ____ is a collection of unprocessed items, which can include text, numbers, images, audio, and video.
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) A good definition for a database is: 1) _______ A) A text file with values delimited by commas B) A collection of related data C) A card catalogue D) A piece of software for managing databases 2) Redundancy refers to what database condition? 2) _______ A) All data is stored in tables B) You have more than one database devoted to the same thing C) The same data is recorded in more than one place in the same database D) A primary key is repeated in another table as a foreign key 3) Which best defines the function of a primary key? 3) _______ A) It uniquely identifies each record B) It is always a number C) It unlocks the data in a table D) It is the first field in a table 4) What best describes the function of a foreign key?
1. What does RAID stand for? Redundant Array of Inexpensive Disks 2. When would we use RAID? RAID is used in large file servers, in transaction of application servers, fault tolerance is required, and when data accessibility is critical 3.
(Points : 3) | Database server Network Hardware User interface | 5. (TCO A) What term below means that multiple users can access and read data at the same time but they lose read consistency? (Points : 3) | Write consistency Redundant data Data nonconcurrency Data consistency | 6. (TCO A) What component of information security architecture consists of people who enforce and keep security in order? (Points : 3) | Public and procedures Security programs Security personnel and administrators Data | 7.
8) Open ended question are questions that don't have fixed answers. 9) Questionnaires are good for asking open ended questions. 10) Job shadowing is a good way to observe exceptions to the usual procedures and rules. 11) A report requirement refers to the need to store data necessary to generate desired reports. 12) User access refers to what objects and data in a database a user has permissions to use.
Points Received: 40 of 40 Comments: ok 2. Question : (TCO 2) Explain business logic and describe how it relates to a relational database. Points Received: 40 of 40 Comments: ok 3. Question : (TCO 4) From first normal form, second normal form, or third normal form, select one of these forms and explain (1) how that normal form is often violated by inexperienced database designers and (2) how to correct such a violation of that normal form. Points Received: 40 of 40 Comments: ok 4.
The Nbtstat command is used to enumerate *nix systems. True or False? * False 31. A NetBIOS name can contain a maximum of ___ characters. * c. 15 32.
cost assessment d. needs analysis e. distribution layering Answer: d, Easy, p. 275 11. In __________, the network designer examines the available technologies and assesses which options will meet the users’ needs. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering Answer: a, Easy, p. 275 12. In __________, the network designer considers the relative cost of the technologies. a. cost assessment b. technology design c. needs analysis d. narrow and deep analysis e. distribution layering Answer: a, Easy, p. 275 13.
Compared to object oriented languages they are more orderly than object oriented languages. Object oriented languages can be abstract in nature. Object oriented programming has its own problems with encapsulation. If the code is hidden from a programmer trying to use or modify the encapsulated code, then the code is essentially useless (Mansfield, 2014). Even if encapsulation creates some security, it might secure the programmer against making changes.
Secondly storage process: involves entering and maintaining information in memory for a period of time and last of all retrieval process: involves recovering stored information from memory so it can be used. There are three main types of models of memory that demonstrate how our memory processes work including the: Multistore Model (MSM), Working Memory Model (WM) and the Levels of Processing Model (LOP). As such, this essay response will be focussed on the evaluation of MSM & LOP memory models supported the arguments with relevant studies. The multi-store model of memory was proposed by Atkinsn and Shiffrin (1968). The multistore model consists of three memory stores: sensory memory (SM), short term memory (STM) and long term memory (LTM) that is used for different tasks.