Goals for the design of thelogical schema include
A.
avoiding data inconsistency
B.
being ableto construct queries easily
C.
being ableto access data efficiently
D.
All of theabove
E.
None of the above

1 Answer

Answer :

All of theabove

Related questions

Description : A logical schema A. is the entire database B. is a standard wayof organizing information into accessible parts C. describes how data is actually stored on disk D. All of theabove E. None of the above

Last Answer : is a standard wayof organizing information into accessible parts

Description : Queries to a database A. are written in English B. can use aggregatefunctions like SUM and COUNT C. both (a)and (b) D. All of theabove E. None of the above

Last Answer : can use aggregatefunctions like SUM and COUNT

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : _______ is designed to be usedin wirelessapplications in which stations must be ableto sharethe medium without interception by an eavesdropperand without beingsubject tojamming from a malicious intruder. A) Spread spectrum B) Multiplexing C) Modulation D) None of the above

Last Answer : Spread spectrum

Description : Devices interconnected by the LAN should include A. Computers and terminals B. mass storage device, printers and plotters C. bridges and gateways D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : In a relational schema, each tuple is divided into fields called A) Relations B) Domains C) Queries D) All of the above

Last Answer : B) Domains

Description : Report generatorsare usedto A. store data input bya user B. retrieve information from files C. answer queries D. both (b)and (c) E. None of the above

Last Answer : both (b)and (c)

Description : In SQL, the CREATE TABLESPACE isused A. to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace B. to createa database trigger C. to add/rename data files, to change storage D. All of theabove E. None of the above

Last Answer : to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : Personal selling tries to achieve three general goals: finding prospects, convincing prospects to buy, and A)monitoring new products being developed. B)being aware of competitors' sales activities. C)depending on one -sale customers. D)avoiding repeat sales. E)keeping customers satisfied.

Last Answer : E)keeping customers satisfied.

Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove

Last Answer : physical

Description : Data flow between two devices canoccur in a _______ way. A) simplex B) half-duplex C) full-duplex D) all of theabove

Last Answer : all of theabove

Description : _____ refers tothe structure or format of the data, meaning the order in which they are presented. A) Semantics B) Syntax C) Timing D) All of theabove

Last Answer : Syntax

Description : Data aresent over pin _____ of the EIA-232 interface. A. 2 B. 3 C. 4 D. All of theabove

Last Answer : 2

Description : Which of the following is not a disadvantage of wireless LAN? A. Slower data transmission B. higher error rate C. interference of transmissions from different computers D. All of theabove

Last Answer : All of theabove

Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above

Last Answer : It provides only sequential access to stored data

Description : Personal selling tries to achieve three general goals : finding prospects, convincing prospects to buy, and 1. monitoring new products being developed 2. being aware of competitors' sales activities 3. depending on one-sale customers 4. avoiding repeat sales 5. keeping customers satisfied

Last Answer : keeping customers satisfied

Description : In Bluetooth, the_____ link is used when data integrity is more important than avoiding latency. A) SCO B) ACL C) ACO D) SCL

Last Answer : ACL

Description : In Bluetooth, the_____ link is used when avoiding latency (delay in data delivery) is more important than integrity (error-free delivery). A) SCO B) ACL C) ACO D) SCL

Last Answer : SCO

Description : In order to use a DBMS, it is important to understand A. the physical schema B. all sub-schemas that thesystem supports C. one subschema D. both (a)and (b) E. None of the above

Last Answer : one subschema

Description : A command that lets youchange one or more fields in a record is A. Insert B. Modify C. Look-up D. All of theabove E. None of the above

Last Answer : Modify

Description : The database administration function includes A. application programming B. computer operations management C. databaseaccessplanning D. All of theabove E. None of the above

Last Answer : databaseaccessplanning

Description : Which commandis usedto selectdistinct subject (SUB) from thetable (BOOK)? A. SELECT ALL FROM BOOK B. SELECT DISTINCT SUB FROM BOOK C. SELECT SUB FROM BOOK D. All of theabove E. None of the above

Last Answer : SELECT DISTINCT SUB FROM BOOK

Description : In SQL, which commandis used to select only onecopy of each setof duplicablerows A. SELECT DISTINCT B. SELECT UNIQUE C. SELECT DIFFERENT D. All of theabove E. None of the above

Last Answer : SELECT DISTINCT

Description : . In order to use arecord management system A. You needto understand thelow-level details of how informationin stored B. You needto understand the model the record management system uses. C. Both (a)and (b) D. All of theabove E. None of the above

Last Answer : You needto understand the model the record management system uses.

Description : Subschema can be used to A. create very different, personalized views of the samedata B. present information in different formats C. hide sensitive informationby omitting fields from thesub¬schema's description D. All of theabove E. None of the above

Last Answer : All of theabove

Description : In SQL, which command(s) is(are) used to change atable's storage characteristics? A. ALTER TABLE B. MODIFY TABLE C. CHANGE TABLE D. All of theabove E. None of the abov

Last Answer : ALTER TABLE

Description : . In SQL, which command(s) is(are) usedto recompilea storedfunction? A. SET FUNCTION B. SET STORED FUNCTION C. ALTER FUNCTION D. All of theabove E. None of the above

Last Answer : ALTER FUNCTION

Description : In SQL, the command(s) is (are)used tocreate an index for atable or cluster A. CREATE INDEX B. MODIFY INDEX C. SET INDEX TO FILE D. All of theabove E. None of the above

Last Answer : CREATE INDEX

Description : What are the datatransmission channels availablefor carrying datafrom one location to another? A. Narrowband B. Voice band C. Broadband D. All of theabove E. None of the above

Last Answer : All of theabove

Description : A central computer surrounded by one or more satellite computers is called a A. bus network B. ring network C. star network D. All of theabove E. None of the above

Last Answer : star network

Description : An anticipated result from multiprogramming operations is: A. reducedcomputer idle time B. the handling of more jobs C. better schedulingof work D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Compared to analog signals, digital signals A. allow faster transmission B. are moreaccurate C. both (a)and (b) D. All of theabove E. None of the above

Last Answer : both (a)and (b)

Description : An example of ananalog communication method is A. laser beam B. microwave C. voice grade telephone line D. All of theabove E. None of the above

Last Answer : All of theabove

Description : The packets switching concept was first proposed A. in the late1980s for the Defense Ministry of US. B. in the early 1960s for military communication systems, mainly to handle speech C. in the late 1950s for Defense Ministry of US D. All of theabove E. None of the above

Last Answer : in the early 1960s for military communication systems, mainly to handle speech

Description : The geostationary satelliteused for communication systems A. rotates with the earth B. remains stationary relative to theearth C. is positioned overequator D. All of theabove E. None of the above

Last Answer : All of theabove

Description : To connect a computer with a device inthe same room, you might be likely to use A. a coaxial cable B. a dedicated line C. a groundstation D. All of theabove E. None of the above

Last Answer : a coaxial cable

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : In networks thatdo not support physical multicastaddressing, multicastingcan be accomplished through _______. A) mapping B) queries C) tunneling D) noneof the above

Last Answer : tunneling

Description : In a/an ………… of DNS resolver, the queried name server can return the best answer it currently has back to the DNS resolver. a. Recursive queries b. Iterative queries c. Reverse queries d. Inverse queries

Last Answer : b. Iterative queries

Description : The ______ are programs that run on DNS clients and DNS servers and that create queries to extract information from name servers. A. transporter B. distributers C. Resolvers D. both a and b

Last Answer : C. Resolvers

Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)

Last Answer : (D) (a), (b), (c) and (d) 

Description : If an Ethernet destination address is08:07:06:05:44:33, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove

Last Answer : unicast

Description : f an Ethernet destination address is07:01:02:03:04:05, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove

Last Answer : multicast