Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order

1. In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

a. Combination key

b. Candidate key

c. Secondary key

d. Foreign key

2. One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems.

a. Combinatorial integrity

b. Referential integrity

c. Foreign integrity

d. Candidate integrity

3. A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities.

a. Hash topology notation

b. Crow's foot notation

c. Dark resistor’s notation

d. Big O notation

4. A table design that contains a repeating group is called _____.

a. Normalized

b. Unsynchronized

c. Unnormalized

d. Synchronized

5. _____ are numbers or letters assigned in a specific order.

a. Category codes

b. Derivation codes

c. Sequence codes

d. Significant digit codes


6. A _____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.

a. Data frame

b. Metadata

c. Data warehouse

d. Pseudo-data


7. _____ is strictly hardware-related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.

a. Simulated storage

b. Virtual storage

c. Logical storage

d. Physical storage


8. _____, a coding method that uses one byte per character, is used on most personal computers.

a. ASCII (American Standard Code for Information Interchange)

b. Unicode

c. EBCDIC (Extended Binary Coded Decimal Interchange Code)

d. ISO (International Organization for Standardization) 10646


9. _____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.

a. Normalization

b. Encryption

c. Encapsulation

d. Standardization


10. Emily is functioning with her customer, Anna, on the design of a new database. She describes to Anna that key fields are utilized to access, coordinate, and preserve the data records.

Emily tells Anna that a primary key is a field or combination of fields that individually and minimally recognizes a specific entity. She mentions that there may be an option of fields or field combinations to use as the primary key. Which of the following is the term used for a feasible primary key

a. Candidate key

b. Multifaceted key

c. Foreign key

d. Ancillary key

Step by Step Solution

3.40 Rating (150 Votes )

There are 3 Steps involved in it

Step: 1

1 d 2 c ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Elementary Surveying An Introduction to Geomatics

Authors: Charles D. Ghilani, Paul R. Wolf

13th Edition

978-0132554343, 132554348, 978-0273751441

More Books

Students also viewed these Databases questions