database multiple questions chapter 15,16

A ____________ is a disconnected, memory-resident representation of the database which contains tables, columns, rows, relationships, and constraints.

_______ is an object-oriented programming language developed by Sun Microsystems that runs on top of Web browser software.

Haven’t Found The Relevant Content? Hire a Subject Expert to Help You With
database multiple questions chapter 15,16
Post Your Own Question And Get A Custom Answer
Hire Writer

____________ is rapidly becoming the data exchange standard for e-commerce applications; it is important because it provides the semantics that facilitate the sharing, exchange, and manipulation of structured documents over organizational boundaries.

________ the objects that manage the connection with a data source and provide data to the consumers.

An _____________ document is an advanced data definition language that is used to describe the structure (elements, data types, relationship types, ranges, and default values) of XML data documents.

Which of the following is NOT a common feature of a web application server?

To define a ______________ you must create a data source name (DSN) for the data source.

A __________ is an external application that is automatically invoked by the browser when needed.

Which of the following is NOT a database connectivity option?

Which of the following is a type of cloud computing implementation?

___________________ refers to the mechanisms through which application programs interact and communicate with data repositories.

A _________ is a series of instructions executed in interpreter mode; it is a plain text file that is not compiled like COBOL, C++, or Java.

Microsoft developed _________to answer the need for non-relational data access and to simplify data connectivity.

_______ was the first piece of Microsoft’s strategy to provide a unified object-oriented framework for the development of next-generation applications.

Which of the following is a well-defined web server interface used frequently today?

______________is “a computing model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computer resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

_____________ is a file that describes XML elements—it provides the composition of the database’s logical model, and defines the syntax rules or valid tags for each type of XML document.

Which of the following is/are the basic components of the ODBC architecture?

Once the DataSet is populated, it is completely independent of the data source – that’s why it’s called “_________”.

Which of the following is NOT one of the most prevalent characteristics of cloud computing services?

Which of the following is considered an advantage of SQL data services?

Which of the following has the potential to turn basic IT services into “commodity” services such as electricity, gas, and water, and to enable a revolution that could change not only the way that companies do business, but the IT business itself?

Which of the following is a type of cloud service that offers turnkey applications that run in the cloud?

Which of the following is NOT considered a main advantage of cloud computing services?

Which of the following is required to create an ODBC data source name?

__________________ is an application programming interface that allows a Java program to interact with a wide range of data sources (relational databases, tabular data sources, spreadsheets, and text files).

___________ is a meta-language used to represent and manipulate data elements.

____________________ are used to extend the functionality of the web server to provide more services and to provide support for access to external databases, fax services, telephony services, directory services, etc.

______ provides an optimized interface that exposed the functionality of the Jet data engine (on which MS Access database if based on) to programmers.

The OLE-DB model is based on which of the two types of objects?

Which of the following is NOT considered a disadvantage of cloud computing services?

A ______________ is a middleware application that expands the functionality of servers by linking them to a wide range of services such as databases, directory systems, and search engines.

_______________is “a computing model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computer resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

____ allows any Windows application to access relational data sources using SQL via a standard application programming interface (API).

The web is a(n) ________________ in that at any given time, a web server does not know the status of any of the clients communicating with it.

To provide such support for scripting languages, especially the ones used for web development, such as Active Server Pages (ASP) and ActiveX, Microsoft developed a new object framework called _______________.

_______________ refers to Internet-based data management services that provide access to hosted relational data management using standard protocols and common programming interfaces.

_______________ scripts contain the code that is required to connect, query, and update a database from a Web front end.

______ uses the lower-level DAO and ODBC for direct access to databases.

 

Given the following XML document that contains an internal DTD. Complete the DTD to accurately describe the XML.

_____ are raw facts of interest to an end user. Examples include a person’s date of birth, an employee name, the number of pencils in stock, etc.

Which of the following is NOT a benefit of a CASE tool?

____________ allows for the translation of the company’s strategic goals into the data and applications that will help the company achieve those goals.

_________ refers to activities and measures that ensures the confidentiality, integrity, and availability of an information system and its main asset, data.

____________ refers to activities and measures that ensures the confidentiality, integrity, and availability of an information system and its main asset, data.

Which of the following is an example of data dictionary usage using SQL statements?

Which of the following is NOT a desired managerial characteristic or skill for a DBA?

Which of the following is NOT a source of dirty data?

The DBA works with application programmers to ensure the quality and integrity of database design and transactions by ensuring that transactions are:

A(n) ________________ automatically records a brief description of database operations performed by all users.

Which of the following is NOT a desired technical characteristic or skill for a DBA?

Which of the following is NOT an area that a DBA must define, communicate and enforce procedures for?

Which of the following is NOT an activity of characteristic of a DBA?

Which of the following DBA activities are used to support end users?

Which of the following is considered the two most important assets of any organization?

Some of the common features of a data dictionary include:

The technical aspects of the DBA’s job are rooted in which of the following areas of operation?

The backup and recovery measures must include which of the following?

Which of the following is NOT considered one of the DBA’s responsibilities?

Which of the following is NOT a role the DBMS facilitates?

_________ is a comprehensive approach to ensuring the accuracy, validity, and timeliness of the data.

Which of the following is NOT an activity of characteristic of a DA?

Which of the following must happen when a corrupting security breach occurs?

______________ is data that contains inaccuracies or inconsistencies (i.e. data that lacks integrity) and may result from a lack of enforcement of integrity constraints, typographical errors, the use of synonyms and homonyms across systems, the use of nonstandard abbreviations, or differences in the decomposition of composite attributes.

A _______________ is a named collection of database access privileges that authorize a user to connect to the database and use its system resources.

A _____________ tool provides an automated framework for the systems development life cycle (SDLC) and is classified according to the extent of support it provides for the SDLC.

As a DBA, what data dimensions would you describe to top-level managers to obtain their support for endorsing the data administration function?

Which of the following special considerations must you take into account when introducing a DBMS into an organization?

Database performance will naturally __________ as the database grows and more users access it.

________are general statements of direction or action that communicate and support DBA goals. Examples include: all users must have passwords or passwords must be changed every six months.

Which of the following cloud related features should be included on a DBA’s checklist of desired DBMS features?

Which of the following statements best explains the role of databases in organizations?

A database _________ is a logical section of the database that belongs to a given user and is identified by the username.

The ________________ is responsible for controlling the overall corporate data resources, both computerized and manual.

Which of the following should NOT be included on a DBA’s checklist of desired DBMS features?

A ________________ is a collection of standards, policies, and procedures created to guarantee the security of a system and ensure auditing and compliance.

A _______________ physically stores the database’s data and is associated with only one tablespace but can reside in a different directory on the hard disk or on multiple hard disks.

________are written instructions that describe a series of steps to be followed during the performance of a given activity. They must be developed within existing working conditions, and they must support and enhance the working environment.

Which of the following is a reason why data quality is important?

Which of the following is NOT a level of data confidentiality?

Which parts of the system does the evaluation process cover?

A _____________ is a DBMS component that stores the definition of data characteristics and relationships.

Which of the following is a desired characteristic or skill for a DBA?

_______describe the minimum requirements of a given DBA activity; they are more detailed and specific than policies and are rules that evaluate the quality of the activity. Examples include: a password must have a minimum of 5 characters and a password must have a maximum of 12 characters.

A _______________ is a logical storage space that is used primarily to group related data logically.

Cloud services provide which of the following?

DBMS operations can be divided into which of the following four main areas?

A _______________ is a separate location in memory that is reserved to run your database.

Security vulnerabilities can fall under which of the following categories?

___________ is processed data or the product of applying some analytical process to data.

Which of the following is NOT one of the characteristics of the DBMS approach over the file-system approach?

__________ deals with the rights of people and organizations to determine who accesses the data and when, where, and how the data are to be used.

___________________ defines procedures to protect and guarantee database security and integrity and includes user access management, view definition, DBMS access control, and DBMS usage monitoring.

The DBA has a(n) ___________ role in installing and maintain the BMS that is in a cloud-based environment.

___________ means protecting the data against accidental or intentional use by unauthorized users.

________ within the data security framework is concerned with keeping data consistent and free of errors or anomalies.

dentify each of the following as either “A – data security” risks or “B – database security” risks.

Calculate the price of your order

Select your paper details and see how much our professional writing services will cost.

We`ll send you the first draft for approval by at
Price: $36
  • Freebies
  • Format
  • Formatting (MLA, APA, Chicago, custom, etc.)
  • Title page & bibliography
  • 24/7 customer support
  • Amendments to your paper when they are needed
  • Chat with your writer
  • 275 word/double-spaced page
  • 12 point Arial/Times New Roman
  • Double, single, and custom spacing
  • We care about originality

    Our custom human-written papers from top essay writers are always free from plagiarism.

  • We protect your privacy

    Your data and payment info stay secured every time you get our help from an essay writer.

  • You control your money

    Your money is safe with us. If your plans change, you can get it sent back to your card.

How it works

  1. 1
    You give us the details
    Complete a brief order form to tell us what kind of paper you need.
  2. 2
    We find you a top writer
    One of the best experts in your discipline starts working on your essay.
  3. 3
    You get the paper done
    Enjoy writing that meets your demands and high academic standards!

Samples from our advanced writers

Check out some essay pieces from our best essay writers before your place an order. They will help you better understand what our service can do for you.

Get your own paper from top experts

Order now

Perks of our essay writing service

We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.

  • Swift delivery
    Our writing service can deliver your short and urgent papers in just 4 hours!
  • Professional touch
    We find you a pro writer who knows all the ins and outs of your subject.
  • Easy order placing/tracking
    Create a new order and check on its progress at any time in your dashboard.
  • Help with any kind of paper
    Need a PhD thesis, research project, or a two-page essay? For you, we can do it all.
  • Experts in 80+ subjects
    Our pro writers can help you with anything, from nursing to business studies.
  • Calculations and code
    We also do math, write code, and solve problems in 30+ STEM disciplines.

Frequently asked questions

Get instant answers to the questions that students ask most often.

See full FAQ
  • What if I’m dissatisfied with the paper I get?

    The average quality score at our professional custom essay writing service is 8.5 out of 10. The high satisfaction rate is set by our Quality Control Department, which checks all papers before submission. The final check includes:
    • Compliance with initial order details.
    • Plagiarism.
    • Proper referencing.
    If for some reason we happen to leave a mistake unnoticed, you are invited to request unlimited revisions of your custom-written paper. For more information, check our Revision Policy. We will do our best to make your experience with Familiar Essays enjoyable.
  • I need an essay on the same day. Is it something you can do?

    Sure. Our writing company offers a fast service with an 8-hour deadline for orders up to master’s level. Make sure to specify the deadline in the order form and our writers will write a paper within the indicated timeslot. Just proceed to submit your requirements here Once you order a custom-written essay, our managers will assign your order to the well-suited writer, who has the best skills and experience for preparing your specific assignment. You can also request one of these extra features:
    • Choose the Writer’s Samples option – study 3 randomly-provided pages from orders that have been written by the assigned writer.
    • Request a specific writer – choose an academic writer from the dropdown list in the order’s form (optional for returning customers).
    You can be sure that your custom writing order will be accomplished by one of our 400+ professional academic writers. They all pass a series of tests to prove their writing prowess and hold the reputation of being the most professional in the industry. Want to make sure writer’s skills match your needs? Get more details on how to choose the appropriate author.
  • How can I be sure your writing service is not a scam?

    We understand that a shade of mistrust has covered the paper writing industry, and we want to convince you of our loyalty. Apart from high-quality writing services, we offer:
    • The chances of students to boost writing skills in a quick and effective way.
    • The opportunity to manage studies and free time in an enjoyable manner.
    • The possibilities to improve overall academic performance.
    Our custom writing company has been working for more than 12 years and always puts quality and clients’ needs first. Our operations are legally documented, we are easily accessible online and offline,
  • Is it legal to use your professional writing service?

    Yes. Custom writing help is not prohibited by any university or college. It’s a 100% legal way of getting professional assistance with paper writing. Hiring writers from an essay writing company is in many ways similar to consulting a tutor – we help you solve the writing issues at hand.
  • How does your service work?

    Our custom writing service is a reliable solution on your academic journey that will always help you if your deadline is too tight. You fill in the order form with your basic requirements for a paper: your academic level, paper type and format, the number of pages and sources, discipline, and deadline. Then, you describe the specific details of the paper you need: add the topic, write or paste the instructions, and attach files to be used, if you have them. After that, an online customer support representative chooses the best writer that specializes in your discipline and assigns him or her to complete the paper according to your requirements. When the paper is ready, we check it for plagiarism and send it to you. If you want to change something, you can request a free revision.
See full FAQ

Take your studies to the next level with our experienced specialists

Live ChatWhatsApp