Upgrade to remove ads
Only ₩37,125/year
- Science
- Computer Science
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (14)
Raw facts such as a social security number or catalog item number for a shirt are known as _____.
a.
data
b.
knowledge
c.
information
d.
entities
data
When rules and relationships are set up to organize raw facts, creating value beyond that of those individual facts, this produces _____.
a.
data
b.
knowledge
c.
information
d.
entities
information
A collection of characteristics that belong to a single person, place, or thing for which data is maintained is a(n) _____.
a.
record
b.
file
c.
attribute
d.
character
record
A(n) _____ is a characteristic or set of characteristics in a record that uniquely identifies the record.
a.
attribute
b.
entity
c.
primary key
d.
data item
primary key
A group of programs used to access and manage a database as well as provide an interface between the database and its users and other application programs is called a _____.
a.
database
b.
database management system
c.
data model
d.
data definition system
database management system
Mollie's company is having problems with their data integrity because multiple database users sometimes access and alter a record at the same time. A database management system could eliminate these problems by implementing _____.
a.
a logical access path
b.
data
definition languages
c.
concurrency control
d.
a schema
concurrency control
Mark creates a new relational database table that includes only five of the seven columns in the existing products table. This action is known as ____.
a.
selecting
b.
joining
c.
projecting
d.
linking
projecting
For the ____ operation, it is required that the the two tables have a common data attribute.
a.
delete
b.
select
c.
project
d.
join
join
Jesse's team is organizing the data in their company's relational database so that all data is stored in only one place and only related data is stored in any given table. What is this process called?
a.
conforming to ACID
properties
b.
data normalization
c.
projecting
d.
selecting and joining
data normalizing
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.
a.
Query by Example (QBE)
b.
Access
c.
Structured Query Language (SQL)
d.
Java
structured query language (SQL)
To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties?
a.
atomicity
b.
durability
c.
isolation
d.
currency
Currency
Julie is a non-IS employee who is responsible for, among other tasks, creating and maintaining consistent reference data and master data definitions and for analyzing data for quality. Coworkers consult with Julie to find out what data to use to answer a business question. Julie is a _____.
a.
data analyst
b.
data steward
c.
database administrator
d.
data owner
data steward
What process detects and then corrects or deletes "bad data"?
a.
data recovery
b.
data enhancement
c.
data
cleansing
d.
data validation
data cleansing
With _____, the database is stored on a service provider's servers and accessed by the client over a network, typically the Internet.
a.
Internet access
b.
database as a service
c.
software as a service
d.
Oracle
data base as a service
Recommended textbook solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
720 solutions
Introduction to the Theory of Computation
3rd EditionMichael Sipser
389 solutions
Operating System Concepts
9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin
489 solutions
C++ Programming: From Problem Analysis to Program Design
5th EditionD. S. Malik
708 solutions
Sets found in the same folderCSC CH 1 exam questions
26 terms
samantha5639
CSC Chpt 2 Exam Questions
25 terms
samantha5639
CSC CHPT 3 Exam questions
15 terms
samantha5639
CSC220 Chpt 4 exam questions
25 terms
samantha5639
Other sets by this creatorCh 11 CSC vocob
35 terms
samantha5639
CSC CH 11 vocab
20 terms
samantha5639
CH 10 Vocab CSC
16 terms
samantha5639
CH 9 vocab CSC
21 terms
samantha5639
Verified questions
COMPUTER SCIENCE
T F If a class doesn’t have a copy constructor, the compiler generates a default copy constructor for it.
Verified answer
COMPUTER SCIENCE
Describe the three types of traditional virtualization.
Verified answer
COMPUTER SCIENCE
When working with this type of file, you access its data from the beginning of the file to the end of the file. a. ordered access b. binary access c. direct access d. sequential access
Verified answer
COMPUTER SCIENCE
True/False: A function that creates a new instance of a class is called an accessor.
Verified answer
Other Quizlet setsPTS FISIKA
21 terms
bf_billafebrina
ch 17 ~Nicole Ward~
37 terms
wardnas
Neuroscience I Final
53 terms
lets-be-real
Final Geology
63 terms
slinoperez
Related questionsQUESTION
Each unique data attribute that is part of a Distinguished name is called a Relative Distinguished Name
4 answers
QUESTION
What is the difference between logical data independence and physical data independence? Which one is harder to achieve? Why?
5 answers
QUESTION
12. Legal-values integrity is the property that states that no record can exist in the database with a value in the field other than one of the legal values.
3 answers
QUESTION
10) The result for SELECT statements in SQL is a relation unless the result is a single number.
13 answers