Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 2 5 ( 1 point ) Saved The use of several databases is one of ERP s major advantages. Question 2 5 options: True

Question 25(1 point)
Saved
The use of several databases is one of ERPs major advantages.
Question 25 options:
True
False
Question 26(1 point)
A document called a system requirements report describes the objectives for an information system.
Question 26 options:
True
False
Question 27(1 point)
Application software for an information system is usually a series of preprogrammed software modules supplied by a software publisher.
Question 27 options:
True
False
Question 28(1 point)
System documentation contains step-by-step instructions for performing specific tasks.
Question 28 options:
True
False
Question 29(1 point)
Human errors are mistakes made by computer operators.
Question 29 options:
True
False
Question 30(1 point)
Most states in the United States have data breach notification statutes that require corporations to take specific steps if a data breach exposes personally identifiable information.
Question 30 options:
True
False
Question 31(1 point)
One of the ways that databases are classified is by their structure.
Question 31 options:
True
False
Question 32(1 point)
A filing cabinet full of folders and papers would be classified as a structured file because every document has a unique structure.
Question 32 options:
True
False
Question 33(1 point)
Data independence is a term that refers to data and program modules being so tightly interrelated that they become difficult to modify.
Question 33 options:
True
False
Question 34(1 point)
Dedicated enterprise database applications may allow cosmetic changes, but they do not encourage modifications of core data structures.
Question 34 options:
True
False
Question 35(1 point)
Spreadsheet software offers database capabilities for establishing relationships between different record types.
Question 35 options:
True
False
Question 36(1 point)
In a case-sensitive database, uppercase letters are equivalent to their lowercase counterparts.
Question 36 options:
True
False
Question 37(1 point)
A database tables physical sort order is the order in which records are arranged on storage devices.
Question 37 options:
True
False
Question 38(1 point)
SQL statements contain command words but do not contain data.
Question 38 options:
True
False
Question 39(1 point)
The entire Internet contains about a petabyte of data.
Question 39 options:
True
False
Question 40(1 point)
Relational databases store unstructured data.
Question 40 options:
True
False
Question 41(1 point)
The process of planning a computer program begins with a problem statement that clearly defines the programs purpose.
Question 41 options:
True
False
Question 42(1 point)
The core of a computer program is a sequence of instructions.
Question 42 options:
True
False
Question 43(1 point)
Third-generation languages added a level of abstraction to machine languages by substituting abbreviated command words for the strings of 1s and 0s used in machine languages.
Question 43 options:
True
False
Question 44(1 point)
Prolog and other declarative languages were classified as fifth-generation languages.
Question 44 options:
True
False
Question 45(1 point)
Algorithms are usually written in a format that is specific to a particular programming language.
Question 45 options:
True
False
Question 46(1 point)
An algorithm can be expressed or documented using pseudocode.
Question 46 options:
True
False
Question 47(1 point)
Procedural languages encourage programmers to approach problems by breaking down the solution into a series of steps.
Question 47 options:
True
False
Question 48(1 point)
A subclass is any class that inherits attributes from a superclass.
Question 48 options:
True
False
Question 49(1 point)
Prolog programming is all about facts and rules.
Question 49 options:
True
False
Question 50(1 point)
The order or sequence of rules in a Prolog program is usually critical.
Question 50 options:
True
False
Question 51(1 point)
There are various encryption methods, but __________ is the encryption standard currently used worldwide.
Question 51 options:
AES (Advanced Encryption Standard)
DDoS (distributed denial of service attacks)
IMSI (International Mobile Subscriber Identity)
TLS (Transport Layer Security)
Question 52(1 point)
Which of the following is not an example of user authentication?
Question 52 options:
Password
PINs
Fingerprint scanner
URLs (Uniform Resource Locators)
Question 53(1 point)
Which of the following is not a characteristic of a weak password?
Question 53 options:
Eight characters in length and include one or more uppercase letters, numbers, and symbols
Uses default passwords such as password, admin, system, and guest
Any sequence that includes a user name

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Conceptual Database Design An Entity Relationship Approach

Authors: Carol Batini, Stefano Ceri, Shamkant B. Navathe

1st Edition

0805302441, 978-0805302448

More Books

Students also viewed these Databases questions

Question

Outline the most common types of organisational structure LO5

Answered: 1 week ago

Question

Writing a Strong Introduction

Answered: 1 week ago