Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
What plan to build a database is it best to use?
|
A. determine the output, next design the tables
|
|
Public Company Accounting Reform and Investor Protection Act is also called:
|
B. Sarbanes Oxley Act
|
|
Which does Not describe the term data redundancy?
a. the same data exists in two tables b. the data is always in linked tables c. It requires updating in two locations d. Output could be incorrect if the first and second location of same data is not updated. |
B. the data is always in linked tables
|
|
A unique field (or combination of fields) that identifies each record in a table is called a ...
|
B. Primary Key
|
|
Which of the following is used to create a relationship between two tables?
a. primary key b. auto-number field c. identification number d. foreign key |
D. foreign key
|
|
What does the term cascading mean?
|
B. Changes in the data travel from one table to another
|
|
What is an example of an expression using a wildcard?
|
C. *west
|
|
Which is an example of an expression that will return records that are from either of two states?
a. New York or California b. New York and California c. New York NOT California d. Is not null |
A. New York OR California
|
|
Which would be used to return a field display result of missing or no video?
a. Not =01/01/2005= b. Is Null c. Is not Null d. - |
A. Not =01/01/2005=
|
|
True or False
If a database design has a flaw, the results produced will not be flawed. |
B. False
|
|
True or False
Data redundancy refers to having repeated data in different tables. |
A. True
|
|
True or False
Properties are set to a default value depending on the data type cannot be changed. |
B. False
|
|
True or False
To append means to add record to an excising table |
A. True
|
|
What is the best definition of a cookie?
|
A. It is a file written to your hard disk by a Website.
|
|
What is the study of converting information into encoded or scrambled formulas called?
|
A. Cryptography
|
|
Firewalls are used to:
|
D. restrict access to the company network from the outside
|
|
a category of information stored in a column of a database is called a ...
|
B. field
|
|
In a database, ___________ fields store numbers used to perform calculations.
|
B. numeric
|
|
In relational databases, tables are linked to each other through a ...
|
D. common field
|
|
Select queries and join queries both use ___________ algebra to extract data.
|
B. relational
|
|
If a college keeps two lists, one for registration and one for room assignments, both containing name and address information, this is an example of data:
|
D. Redundancy
|
|
The language that the CPU understands, consiting of a sequence of bits, is called:
|
D. machine language
|
|
Tags such as <i>italics</i> are examples of which of the following?
a. HTML/XHTML b. Java c. C++ d. BASIC |
A. HTML/XHTML
|
|
The two main types of control structures are the binary decision and the _______.
|
C. loop
|
|
True or False
HTML is NOT a programming language |
A. True
|
|
BASIC, FORTRAN, COBOL, C+++ and Java are all ________ languages
|
D. 3GL
|
|
Translating an algorithm into a programming language is called ...
|
C. coding
|
|
Structured Query Language (SQL) is an example of?
|
B. fourth-generation language
|
|
Flowcharts and data flow diagrams are used during which step in the SDLC?
|
A. Design
|
|
Which of the following is the programming language often used to build Window application:
a. C++ b. Visual Basics c. Java d. HTML |
B. Visual Basics
|
|
What language is used for applications that need to collect information from networked computers?
|
D. Java
|
|
Which is NOT a reason to save the first and last name as separate fields?
a. You can sort on last name b. The first name could be used in saturation of a letter c. It uses fewer fields d. You can use ONLY the first or last name with a saturation |
C. It uses fewer fields
|
|
Which of the following is a special definition setting used on a field containing an employee's date of hire?
a. Data arithmetic b. Constant c. Date/Time field d. Calculated field |
C. Date/Time field
|
|
Access recognizes ____________ data types
|
Ten
|
|
Data that is organized and summarized in an easy to read view is known as a:
|
B. Pivot Table
|
|
Which statement is NOT true about Access sharing data with Excel?
a. Data can be moved easily between the two applications with cut and paste. b. A wizard can help facilitate the sharing of data c. Tables of data can be imported and exported d. The Get External Data command is used to do the importing. |
A. Data can be moved easily between the two applications with cut and paste.
|
|
Active commands are displayed in the _________ bar
|
D. Status
|
|
Which does NOT describe queries?
a. They perform calculations b. They are run from a table Datasheet View c. They display specific records from table(s) d. They ask questions about data in a database and return answers in a specified order |
B. They are run from a table Datasheet View
|
|
True or False
In Access 2007, backup files should be created through the Office button, in case the original database becomes ruined. |
A. True
|
|
------------------------
|
--------------------------
|
|
All __________ in Excel begin with an equal (=) sign
|
D. dates
|
|
Assume you open your credit card bill and see several large unauthorized charges. Unfortunately, you may have been the victim of:
|
A. Identity theft
|
|
An internet ________ attack occurs when an Internet server is purposely overloaded so it, cannot process legitimate transmissions
|
B. denial of service
|
|
A destructive program that remains on a computer system until the occurrence of a special event or time is called a:
|
B. Time bomb
|
|
What is the best definition of a computer hacker?
|
D. A hacker is a program who investigates a computer system to understand both its full capabilities and vulnerabilities
|
|
Which of the following statements is FALSE?
a. Technology often moves faster than the ruler required to govern it. b. The policy of "fair use" allows copyrighted music to be reproduced for a profit without the permission of the creator. c. Intellectual property is protected through copyright laws. d. Original music, writing and art are considered intellectual property. |
B. The policy of "fair use" allows copyrighted music to be reproduced for a profit without the permission of the creator.
|
|
Which of the following is a database management system?
a. Microsoft Project b. Microsoft Excel c. SQL d. Microsoft Access |
D. Microsoft Access
|
|
An individual trained in the design and building of databases is called a database:
|
B. administrator
|
|
What does the acronym DBMS stand for?
|
D. Database Management System
|
|
In Access, the Simple Query Wizard uses ___________ to create a query
|
D. SQL
|