Question
Indicate the answer choice that best completes the statement or answers the question. 1. A form of wireless transmission called _____ is very popular for
Indicate the answer choice that best completes the statement or answers the question. |
1. A form of wireless transmission called _____ is very popular for short-distance wireless communication that does not require high power.
|
2. A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.
|
3. Designing tables is easier if a _____ is used to show a tables structure, fields, and primary key.
|
4. Which of the following configurations has a central wireless device that is used to serve all wireless clients?
|
5. _____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.
|
6. In its wireless configuration, the _____ is similar to a hub in the local area network (LAN) star topology, except it provides network services to wireless clients instead of wired clients.
|
7. A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.
|
8. To bridge the gap between a database and the Internet, it is necessary to use a _____, which is software that integrates different applications and allows them to exchange data.
|
9. A new system might have to interface with one or more _____, which are older systems that use outdated technology.
|
10. _____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.
|
11. In a multi-tier system, special utility software called _____ enables the tiers to communicate and pass data back and forth.
|
12. With a _____, users provide an example of the data requested.
|
13. In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.
|
14. A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.
|
15. A _____ controls database operations, including storing, retrieving, updating, and deleting data.
|
16. The way a network is configured is called the _____.
|
17. Wireless network speed is measured in _____.
|
18. The data mining technique that relies on association rule learning is often called _____.
|
19. In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
|
20. A _____ is a set of letters or numbers that represents a data item.
|
|
Identify the letters of the choices that best match the phrases or definitions.
|
21. Defines only those portions of the database that a particular system or user needs or is allowed to access |
22. A coding method used on mainframe computers and high-capacity servers |
23. A person, place, thing, or event for which data is collected and maintained |
24. A field in one table that must match a primary key value in another table in order to establish the relationship between the two tables |
25. A set of rules that avoids data inconsistency and quality problems |
26. A technique used by analysts to define relationships in more detail, after drawing an initial entity-relationship diagram |
27. A widely used method of visualizing and documenting software systems design |
28. Could help a consumer products firm identify potential customers based on their prior purchases |
29. A set of field values that describes a single person, place, thing, or event |
30. A kind of storage that refers to data that a user can view, regardless of how or where the information actually is organized or stored |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started