Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Indicate the answer choice that best completes the statement or answers the question. 1. A form of wireless transmission called _____ is very popular for

Indicate the answer choice that best completes the statement or answers the question.

1. A form of wireless transmission called _____ is very popular for short-distance wireless communication that does not require high power.

a.

Bluetooth

b.

Microsoft Visio

c.

multipath design

d.

Wi-MAX

2. A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.

a.

local area network (LAN)

b.

wireless local area network (WLAN)

c.

metropolitan area network (MAN)

d.

storage area network (SAN)

3. Designing tables is easier if a _____ is used to show a tables structure, fields, and primary key.

a.

distinct notation format

b.

multifaceted notation format

c.

viewport notation format

d.

standard notation format

4. Which of the following configurations has a central wireless device that is used to serve all wireless clients?

a.

The Basic Service Set (BSS)

b.

A point-of-sale (POS) terminal

c.

A data frame

d.

The OSI (Open Systems Interconnection) model

5. _____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.

a.

ASCII (American Standard Code for Information Interchange)

b.

EBCDIC (Extended Binary Coded Decimal Interchange Code)

c.

Unicode

d.

ISO (International Organization for Standardization)

6. In its wireless configuration, the _____ is similar to a hub in the local area network (LAN) star topology, except it provides network services to wireless clients instead of wired clients.

a.

Wi-Fi Alliance

b.

access point

c.

fat client

d.

data frame

7. A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.

a.

no-frills key

b.

super key

c.

secondary key

d.

foreign key

8. To bridge the gap between a database and the Internet, it is necessary to use a _____, which is software that integrates different applications and allows them to exchange data.

a.

middleware

b.

stack

c.

server

d.

firmware

9. A new system might have to interface with one or more _____, which are older systems that use outdated technology.

a.

enterprise resource planning (ERP) systems

b.

mission-critical systems

c.

legacy systems

d.

intrusion detection systems

10. _____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.

a.

Encapsulation

b.

Normalization

c.

Standardization

d.

Encryption

11. In a multi-tier system, special utility software called _____ enables the tiers to communicate and pass data back and forth.

a.

shareware

b.

middleware

c.

groupware

d.

malware

12. With a _____, users provide an example of the data requested.

a.

query language

b.

data table

c.

query by example language

d.

data frame

13. In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.

a.

primary key

b.

secondary key

c.

candidate key

d.

foreign key

14. A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.

a.

procedural language

b.

query by example language

c.

query language

d.

imperative language

15. A _____ controls database operations, including storing, retrieving, updating, and deleting data.

a.

data manipulation language

b.

data device language

c.

data definition language

d.

data query language

16. The way a network is configured is called the _____.

a.

network orientation

b.

network baseline

c.

network topology

d.

network index

17. Wireless network speed is measured in _____.

a.

Bps (bits per second)

b.

Kbps (kilobytes per second)

c.

Gbps (gigabits per second)

d.

Tbps (terabytes per second)

18. The data mining technique that relies on association rule learning is often called _____.

a.

simulated analysis

b.

virtual storage analysis

c.

strategy-oriented analysis

d.

market basket analysis

19. In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

a.

secondary key

b.

candidate key

c.

combination key

d.

foreign key

20. A _____ is a set of letters or numbers that represents a data item.

a.

business glossary

b.

data dictionary

c.

mnemonic

d.

code

Identify the letters of the choices that best match the phrases or definitions.

a.

Unified Modeling Language (UML)

b.

Cardinality

c.

Foreign key

d.

Data mining

e.

Referential integrity

f.

Subschema

g.

Extended Binary Coded Decimal Interchange Code (EBCDIC)

h.

Entity

i.

Logical record

j.

Logical storage

21. Defines only those portions of the database that a particular system or user needs or is allowed to access

22. A coding method used on mainframe computers and high-capacity servers

23. A person, place, thing, or event for which data is collected and maintained

24. A field in one table that must match a primary key value in another table in order to establish the relationship between the two tables

25. A set of rules that avoids data inconsistency and quality problems

26. A technique used by analysts to define relationships in more detail, after drawing an initial entity-relationship diagram

27. A widely used method of visualizing and documenting software systems design

28. Could help a consumer products firm identify potential customers based on their prior purchases

29. A set of field values that describes a single person, place, thing, or event

30. A kind of storage that refers to data that a user can view, regardless of how or where the information actually is organized or stored

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Icdt 88 2nd International Conference On Database Theory Bruges Belgium August 31 September 2 1988 Proceedings Lncs 326

Authors: Marc Gyssens ,Jan Paredaens ,Dirk Van Gucht

1st Edition

3540501711, 978-3540501718

More Books

Students also viewed these Databases questions

Question

Enhance your listening skills.

Answered: 1 week ago

Question

What do you mean by underwriting of shares ?

Answered: 1 week ago

Question

Define "Rights Issue".

Answered: 1 week ago

Question

Discuss the Rights issue procedure in detail.

Answered: 1 week ago

Question

Discuss the Rights issue procedure in detail.

Answered: 1 week ago

Question

Explain the procedure for valuation of shares.

Answered: 1 week ago

Question

What is the role of the Joint Commission in health care?

Answered: 1 week ago