A shared database should: All of these provide for backup and recovery. be accurate and available. be secure. TRUE ANSWER : ? YOUR ANSWER : ?
An enterprise data model is: a non-graphical model that shows the all entities for an organization. a graphical model that shows all entities for an organization. a graphical model that shows the high-level entities for an organization. a non-graphical model that shows the high-level entities for an organization. TRUE ANSWER : ? YOUR ANSWER : ?
Legacy data is which of the following? Data contained in a newly-installed system Data contained in a file system Data rejected during the installation of a new system Data contained by a system used prior to the installation of a new system TRUE ANSWER : ? YOUR ANSWER : ?
A database management system (DBMS) is a: hardware system used to create, maintain, and provide controlled access to a database. hardware system used to create, maintain, and provide uncontrolled access to a database. software system used to create, maintain, and provide controlled access to a database. software system used to create, maintain, and provide uncontrolled access to a database. TRUE ANSWER : ? YOUR ANSWER : ?
The primary mechanism for providing context for data is metadata. True False TRUE ANSWER : ? YOUR ANSWER : ?
Stand-alone databases exhibit many of the same advantages common to file processing systems. True False TRUE ANSWER : ? YOUR ANSWER : ?
Data administrators are responsible for: writing application programs. overall management of data resources in an organization. physical database design. managing technical issues in the database environment. TRUE ANSWER : ? YOUR ANSWER : ?
Duplicate data often results in loss of data integrity because: Both A & the data formats may be inconsistent. data values may not agree. Neither A & TRUE ANSWER : ? YOUR ANSWER : ?
The database approach requires additional costs and risks. True False TRUE ANSWER : ? YOUR ANSWER : ?
An extranet is which of the following? The use of Internet protocols with unlimited access to company data by people within an organization. The use of Internet protocols with limited access to company data by the company's customers and suppliers. The use of Internet protocols with unlimited access to company data by the company's customers and suppliers. The use of Internet protocols with limited access to company data by people within an organization. TRUE ANSWER : ? YOUR ANSWER : ?