Question
1. In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order
1. In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
a. Combination key
b. Candidate key
c. Secondary key
d. Foreign key
2. One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems.
a. Combinatorial integrity
b. Referential integrity
c. Foreign integrity
d. Candidate integrity
3. A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities.
a. Hash topology notation
b. Crow's foot notation
c. Dark resistor’s notation
d. Big O notation
4. A table design that contains a repeating group is called _____.
a. Normalized
b. Unsynchronized
c. Unnormalized
d. Synchronized
5. _____ are numbers or letters assigned in a specific order.
a. Category codes
b. Derivation codes
c. Sequence codes
d. Significant digit codes
6. A _____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.
a. Data frame
b. Metadata
c. Data warehouse
d. Pseudo-data
7. _____ is strictly hardware-related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.
a. Simulated storage
b. Virtual storage
c. Logical storage
d. Physical storage
8. _____, a coding method that uses one byte per character, is used on most personal computers.
a. ASCII (American Standard Code for Information Interchange)
b. Unicode
c. EBCDIC (Extended Binary Coded Decimal Interchange Code)
d. ISO (International Organization for Standardization) 10646
9. _____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.
a. Normalization
b. Encryption
c. Encapsulation
d. Standardization
10. Emily is functioning with her customer, Anna, on the design of a new database. She describes to Anna that key fields are utilized to access, coordinate, and preserve the data records.
Emily tells Anna that a primary key is a field or combination of fields that individually and minimally recognizes a specific entity. She mentions that there may be an option of fields or field combinations to use as the primary key. Which of the following is the term used for a feasible primary key
a. Candidate key
b. Multifaceted key
c. Foreign key
d. Ancillary key
Step by Step Solution
3.40 Rating (150 Votes )
There are 3 Steps involved in it
Step: 1
1 d 2 c ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started