Home » Undergraduate study » Module 11: Building Solutions
Agile development guidelines emphasize adaptation of goals and continuous improvement of the software or app. Answer:True
A(n) is a number(s) or character(s) appended to or inserted in a primary key value.
address
validator
value-add
check digit
A(n) test measures the performance of hardware or software.
benchmark
touchstone
evaluation
analysis
A(n) is a collection of data organized in a manner that allows access, retrieval, and use of that data. Answer:database
A back end is a program that generally has a more user-friendly interface than the DBMS. Answer:False
A data is a stored collection of related records. Answer:file
The collection of biometric and other data used in criminal investigation is called digital . Answer:forensics
With a(n) language, a software developer writers instructions using English-like words that tell the computer what to accomplish and how to do it. Answer:procedural
Megan’s Law refers to a group of U.S. laws that require law enforcement agencies to share information in a national database about criminals who commit unlawful acts on children. Answer:True
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data.
Which of the following is NOT one of the three V’s of Big Data.
Volatility
Volume
Variety
Velocity
Which of the following is NOT an activity in the implementation phase?
Develop programs and apps
Install and test the new system
Solicit vendor proposals
Convert to the new system
In a typical file processing system, each department or area within an organization has its own set of files. Answer:True
Identify the letter of the choice that best matches the phrase or definition.
A working model of the proposed system’s essential functionality Answer:a. proof of concept
A group of related fields Answer:i. record
Has special keywords and rules that users include in statements Answer:k. SQL
Verifies that an application works with other applications Answer:d. integration test
The collection and summarization of data, information, and deliverables Answer:g. documentation
What each byte represents in ASCII Answer:h. character
A measure of how suitable the development of a system will be to the organization Answer:l. feasibility
A field that uniquely identifies each record in a file Answer:j. primary key
Kind of rules that decrease data entry errors, and thus enhance the data’s integrity Answer:n. validation
Performed by end users and checks the new system to ensure that it works
with actual data
Answer:e. acceptance test
While a user is working with the database, this resides in the memory of the computer. Answer:o. DBMS
The smallest unit of data a user accesses Answer:f. field
Whether designed for a small or large computer, most DBMSs perform common ones. Answer:c. systems test
Verifies that each individual program or object works by itself Answer:b. unit test
This database capability is one of the more powerful database features. Answer:m. querying
Some web databases are databases, where users store and share media with other registered users.
wiki
combination
synergic
collaborative
A(n) is the smallest unit of data a user accesses.
A(n) is an item that contains data, as well as the actions that read or process the data.
field
record
object
table
When an organization uses the database approach, many programs and users share the data in the database. Answer:True
A data contains data about each file in the database and each field in those files.
dictionary
guide
reference
encyclopedia
HTML is a programming language. Answer:False
Census records, stock values, and corporate sales data is structured. Answer:True
A(n) database stores data in tables that consist of rows and columns.
multidimensional
distributed
relational
data warehouse
Unlike a form, you use a report writer only to retrieve data. Answer:True
Experian, Equifax, and Transunion are all types of companies.
security
financial planning
stock exchange
credit reporting
With a direct conversion, only one location in the organization uses the new system, so that it can be tested. Answer:False
A numeric check determines whether a number is within a specified range. Answer:False
Why would a field that contains numbers have a text data type?
It shouldn’t — this is a mistake that should be fixed.
Because the values will not be used in calculations.
Because the numbers represent letters.
In order to keep the number of data types to a minimum.
compares data with a set of rules or values to determine if the data meets certain criteria.
Validation
Processing
Evaluation
Analysis
A DBMS uses the data dictionary to perform validation checks. Answer:True
More complex DBMSs maintain a(n) , which is a listing of activities that modify the contents of the database. Answer:log
A(n) is a request for specific data from the database. Answer:query
Which of the following best defines big data?
Data accessible by large groups of users
Fields capable of storing multiple gigabytes of information
Large-scale data sets that require advanced technologies
A database that specializes in calculating large numbers
The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs. Answer:True
Which of the following is NOT an advantage of the database approach?
Improved data integrity
Reduced development time
Eliminates redundant data
Easier access
Which of the following best describes the function of a primary key?
To provide decryption of data
The first record in a data file
Another term for file name
To uniquely identify each record in a file
A(n) is a combination of one or more related characters or bytes. Answer:field
A composite key consists on multiple fields. Answer:True
Database software is another term for a DBMS. Answer:True
Monitoring system performance is a part of the support and security phase. Answer:True
A(n) is a series of statements that instructs a program or app how to complete a task. Answer:macro
A data defines how users view the organization of the data. Answer:model
In a(n) , the DBMS uses the log to reenter changes made since the last save or backup.
rollforward
backward recovery
retroactive backup
partial restore
Which of the following is NOT true about web application development?
CSS allows web designers to separate the code that specifies content from code that specifies appearance.
JavaScript can be used to display alert messages or windows.
HTML uses a set of codes called tags to instruct a browser how to structure content.
Some computers and mobile devices do not support HTML5 but instead rely on Flash.
Many programs today use on a webpage as their front end.
PDF documents
landing pages
spreadsheets
forms
A relational database can store more than two dimensions of data. Answer:False
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data.
Data is the process of presenting data graphically as charts, maps, or other pictorial formats.
drawing
art
visualization
illustration
Which of the following is another term for a JAD session?
focus group
web conference
programming phase
steering committee
During which phase of system development would you develop any necessary programs and apps?
Planning
Analysis
Design
Implementation
Detailed analysis sometimes is called design.
practical
virtual
predictive
logical
Which of the following is NOT true about OOP languages?
An IDE contains tools for building GUIs, editor, a compiler and/or interpreter, and a debugger.
Java and C++ are examples of OOP languages.
A disadvantage of OOP is that you cannot reuse or modify existing objects.
An object represents a real person, place, event, or transaction.
A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format. Answer:True
An object data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image. Answer:False
FIP addresses concerns regarding security of information protocols. Answer:False
The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications. Answer:True
Gantt and PERT are types of used to plan and schedule time relationships among project activities.
charts
apps
deliverables
documents
File processing systems require more memory and processing power than databases. Answer:False
In some database programs, a data file is referred to as a(n) .
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor.
Gregor tells you that when a DBMS flags a deleted record, .
it is removed physically from the drive
nothing happens — records cannot be deleted
it is deleted logically
it means the data is invalid
A(n) is a group of related fields. Answer:record
Which of the following best describes the principle of least privilege?
Users should not share access details with colleagues.
Database restrictions should be lifted in order to allow all users to contribute to data integrity.
Users’ access privileges are limited to the lowest level necessary perform required tasks.
Data entry is done using a back end.
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor.
Gregor tells you that a(n) check verifies that a required field contains data.
integration
processing
completeness
entirety
With the database approach, the data is independent of the programs that access the data. Answer:True
Each programming language has its own rules, or , for writing instructions. Answer:syntax
During which phase of system development would you acquire any necessary hardware and software?
Planning
Analysis
Design
Implementation
data is stored in separate files in different departments.
Isolated
Detached
Divorced
Exiled
QBE stands for query by .
A(n) translates and executes one instruction at a time and converts it to machine language.
compiler
executor
translator
interpreter
Which data type sometimes is called BLOB?
Yes/No
Object
Memo
Number
Eight bytes grouped together form a bit. Answer:False
A(n) is a window on the screen that provides areas for entering or modifying data in a database. Answer:form
The field defines the maximum number of characters a field can contain.
width
length
size
capacity
Which of the following is NOT one of the three general guidelines for system development?
Involve users
Define standards
Create documentation
Group activities into phases
Continuous backup is inexpensive because the data is constantly being backed up. Answer:False
A(n) is a separate program that converts the entire source program into machine language before executing it. Answer:compiler
A(n) database is a huge database used to analyze transactions.
data warehouse
object-oriented
distributed
relational
A Yes/No data type also is called .
either/or
optional
choice
Boolean
A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete. Answer:False
To add interactivity on webpages, web developers write small programs called . Answer:scripts
File refers to the procedures that keep data current.
integrity
maintenance
administration
validation
Because the data dictionary contains details about data, some call it . Answer:metadata
Which of the following best describes function creep?
When a company uses the technology intended for one purpose for a different purpose
When a user accesses data without authorization
When a project’s features keep being added to during development
When spyware collects and transmits data from a database