Filters
Question type

 A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions.​ 


A)  ​relational 
B)  ​operational 
C)  ​analytical 
D)  ​non relational

Correct Answer

verifed

verified

 In the context of database security, user ______ management allows access to data on an as-needed basis.​

Correct Answer

verifed

verified

rights, pe...

View Answer

 ​Which SQL keyword is used to search for records? 


A)  ​FIND 
B)  ​SEARCH 
C)  ​SELECT 
D)  ​UPDATE

Correct Answer

verifed

verified

 One of the ways that databases are classified is by their structure.​ 

Correct Answer

verifed

verified

 The relationship between record types can be depicted graphically with a(n) _________.​ 


A)  ​data archive 
B)  executive dashboard​ 
C)  ​OLAP 
D)  ​ERD

Correct Answer

verifed

verified

 Modern database tools support ________________, which entails separating data from the programs that manipulate data.​ 


A)  ​Predictive analytics 
B)  ​Cardinality 
C)  ​data independence 
D)  data dependence​

Correct Answer

verifed

verified

C

 SQL keywords must be entered in all uppercase letters because they are case-sensitive.​ 

Correct Answer

verifed

verified

 The term __________ is used to refer to a group of technologies for managing databases that do not adhere to the relational model and standard SQL query language.​

Correct Answer

verifed

verified

 ​An efficiently designed database uses computed fields whenever possible because they do not require manual data entry. 

Correct Answer

verifed

verified

 _________ refers to the number of associations that can exist between two record types.​

Correct Answer

verifed

verified

 A database ____________ contains a list of keys, and each key provides a pointer to the record that contains the rest of the fields related to that key.​

Correct Answer

verifed

verified

 A lookup routine validates an entry by checking data in an in-house or third-party database.​ 

Correct Answer

verifed

verified

 Rather than deleting old data, it can be moved to a data __________.​

Correct Answer

verifed

verified

 The term __________ refers to huge collections of data that are difficult to process, analyze, and manage using conventional database tools.​

Correct Answer

verifed

verified

 In the context of database security, database ______ identifies sensitive data and database vulnerabilities in order to secure them.​

Correct Answer

verifed

verified

assessment​

 One of the most common database operations is to query for a particular record or group of records by using the ________ command.​

Correct Answer

verifed

verified

 A computed ___________ is a calculation that a DBMS performs, similar to the way a spreadsheet computes a formula.​​ 


A)  ​table 
B)  ​field 
C)  ​record 
D)  ​relationship

Correct Answer

verifed

verified

B

 Which of the following is not considered to be type of database client?​ 


A)  ​Local software 
B)  ​Browsers 
C)  ​Apps 
D)  ​all of the above

Correct Answer

verifed

verified

 A(n) _______________  is a field that contains data unique to a record.​ 


A)  ​query 
B)  ​parameter 
C)  ​primary key 
D)  ​key-value

Correct Answer

verifed

verified

 A hierarchical database allows one-to-many relationships but not one-to-one relationships.​ 

Correct Answer

verifed

verified

Showing 1 - 20 of 102

Related Exams

Show Answer