Database management systems are intended to:
A.
eliminatedata redundancy
B.
establishrelationships among records in different files
C.
manage file access
D.
maintaindata integrity
E.
All of theabove

1 Answer

Answer :

All of theabove

Related questions

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)

Last Answer : (D) (a), (b), (c) and (d) 

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : In SQL, the CREATE TABLESPACE isused A. to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace B. to createa database trigger C. to add/rename data files, to change storage D. All of theabove E. None of the above

Last Answer : to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace

Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above

Last Answer : Database management system (DBMS)

Description : The database administration function includes A. application programming B. computer operations management C. databaseaccessplanning D. All of theabove E. None of the above

Last Answer : databaseaccessplanning

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : Queries to a database A. are written in English B. can use aggregatefunctions like SUM and COUNT C. both (a)and (b) D. All of theabove E. None of the above

Last Answer : can use aggregatefunctions like SUM and COUNT

Description : A logical schema A. is the entire database B. is a standard wayof organizing information into accessible parts C. describes how data is actually stored on disk D. All of theabove E. None of the above

Last Answer : is a standard wayof organizing information into accessible parts

Description : A zone is a contiguous portion of a ………….. of the DNS namespace whose database records exist and are managed in a……….. DNS database file. A. domain, particular B. Class, particular C. tree, local D. Domain, every

Last Answer : A. domain, particular

Description : A collection of interrelated records is called a: a) Information Management System b) Files Colleague c) Utility Files d) Database e) None of These

Last Answer : d) Database

Description : Goals for the design of thelogical schema include A. avoiding data inconsistency B. being ableto construct queries easily C. being ableto access data efficiently D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : The packets switching concept was first proposed A. in the late1980s for the Defense Ministry of US. B. in the early 1960s for military communication systems, mainly to handle speech C. in the late 1950s for Defense Ministry of US D. All of theabove E. None of the above

Last Answer : in the early 1960s for military communication systems, mainly to handle speech

Description : The geostationary satelliteused for communication systems A. rotates with the earth B. remains stationary relative to theearth C. is positioned overequator D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : In SQL, the command(s) is (are)used tocreate an index for atable or cluster A. CREATE INDEX B. MODIFY INDEX C. SET INDEX TO FILE D. All of theabove E. None of the above

Last Answer : CREATE INDEX

Description : . In order to use arecord management system A. You needto understand thelow-level details of how informationin stored B. You needto understand the model the record management system uses. C. Both (a)and (b) D. All of theabove E. None of the above

Last Answer : You needto understand the model the record management system uses.

Description :  . Integrity in the project management field is accomplished through all of the  following except which one?  A. Training to learn how to manage relationships with others from different ... C. Applying established project management processes D. Following the PMP Code of Professional Conduct

Last Answer : A. Training to learn how to manage relationships with others from different cultures

Description : A relational database management (RDBM) package manages datain morethan one file at once. How does itorganizethese file? As A. tables B. relations C. tuple D. both (a)and (b) E. None of the above

Last Answer : both (a)and (b)

Description : A collection of interrelated records is called a 1) Management Information System 2) Spread Sheet 3) Database 4) Text file

Last Answer : 3) Database

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : In SQL, which commandis used to select only onecopy of each setof duplicablerows A. SELECT DISTINCT B. SELECT UNIQUE C. SELECT DIFFERENT D. All of theabove E. None of the above

Last Answer : SELECT DISTINCT

Description : Subschema can be used to A. create very different, personalized views of the samedata B. present information in different formats C. hide sensitive informationby omitting fields from thesub¬schema's description D. All of theabove E. None of the above

Last Answer : All of theabove

Description : It is more accurate to define a _____ as a variety of different recordtypes that aretreated as asingle unit A. Database B. Table C. Record D. Flat File E. None of the above

Last Answer : Database

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : Which of the following is not a disadvantage of wireless LAN? A. Slower data transmission B. higher error rate C. interference of transmissions from different computers D. All of theabove

Last Answer : All of theabove

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify? a. Track number b. Sector number c. Surface number d. All of above

Last Answer : Track number

Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above

Last Answer : It provides only sequential access to stored data

Description : ……… is not covered under file management. (a) Secure files (b) Easy access to files (c) Schedule processes (d) Keep backup of files -Technology

Last Answer : (c) Because schedule processes comes under processor management.

Description : A characteristic of card systems is: a. Slowness in processing data b. Using cards as records of transactions c. Needing a larger DP staff d. All of the above

Last Answer : All of the above

Description : The divisor in a cyclic code is normally called the _________. A) degree B) generator C) redundancy D) none of the above

Last Answer : generator

Description : . In cyclic redundancy checking, the divisor is _______the CRC. A) The same size as B) one bit less than C) one bit more than D) none of the above

Last Answer : one bit more than

Description : _____ provides redundancy toensure synchronization and inherent errordetection. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Block coding

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : CRC stands for __________ a. cyclic redundancy check b. code repeat check c. code redundancy check d. cyclic repeat check

Last Answer : a. cyclic redundancy check

Description : CRC stands for __________ A. cyclic redundancy check B. code repeat check C. code redundancy check D. cyclic repeat check

Last Answer : A. cyclic redundancy check

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : A command that lets youchange one or more fields in a record is A. Insert B. Modify C. Look-up D. All of theabove E. None of the above

Last Answer : Modify

Description : Which commandis usedto selectdistinct subject (SUB) from thetable (BOOK)? A. SELECT ALL FROM BOOK B. SELECT DISTINCT SUB FROM BOOK C. SELECT SUB FROM BOOK D. All of theabove E. None of the above

Last Answer : SELECT DISTINCT SUB FROM BOOK

Description : In SQL, which command(s) is(are) used to change atable's storage characteristics? A. ALTER TABLE B. MODIFY TABLE C. CHANGE TABLE D. All of theabove E. None of the abov

Last Answer : ALTER TABLE

Description : . In SQL, which command(s) is(are) usedto recompilea storedfunction? A. SET FUNCTION B. SET STORED FUNCTION C. ALTER FUNCTION D. All of theabove E. None of the above

Last Answer : ALTER FUNCTION

Description : What are the datatransmission channels availablefor carrying datafrom one location to another? A. Narrowband B. Voice band C. Broadband D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Devices interconnected by the LAN should include A. Computers and terminals B. mass storage device, printers and plotters C. bridges and gateways D. All of theabove E. None of the above

Last Answer : All of theabove

Description : A central computer surrounded by one or more satellite computers is called a A. bus network B. ring network C. star network D. All of theabove E. None of the above

Last Answer : star network

Description : An anticipated result from multiprogramming operations is: A. reducedcomputer idle time B. the handling of more jobs C. better schedulingof work D. All of theabove E. None of the above

Last Answer : All of theabove