Which data repository type is most likely to include database tables and primary keys in its internal data structure quizlet?

Recommended textbook solutions

Which data repository type is most likely to include database tables and primary keys in its internal data structure quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Which data repository type is most likely to include database tables and primary keys in its internal data structure quizlet?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

720 solutions

Which data repository type is most likely to include database tables and primary keys in its internal data structure quizlet?

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Which data repository type is most likely to include database tables and primary keys in its internal data structure quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (40)

Darcie has hired a programmer to make some custom changes to a DBMS she plans to move her business database to. What kind of DBMS is she using?

Open source

Raphael is working with a table in Access. He needs to see all the records for customers in Chattanooga so he can check the zip codes in that city. Which database tool will show only these records in the table?

Filter

Kiera is building a front-end user interface for the database her new website will use. Which of the following languages is NOT used to build a webpage?

SQL

Casey is looking for a free, open-source RDBMS for his company. Which of the following best meets these requirements?

PostgreSQL

What kind of database is needed to hold and organize diverse data types, such as X-ray images and doctors' notes, in a medical database?

Nonrelational database

Which of the following scenarios would most likely rely on Big Data? Choose two.

Evaluating applications for disability benefits and Calculating traffic delays during rush hour

What characteristic of Big Data indicates how closely that data matches reality?

veracity

Which data repository type is most likely to include database tables and primary keys in its internal data structure?

Data warehouse

Which of the following would most likely be the key paired with a value of "Canada" in a nonrelational customer database?

Country

Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key?

ProductID

What programming language supports relational databases?

SQL

Which of the following is a key aspect of database security according to the CIA triad security model? Choose two.

Availability and Integrity

Mindy needs to run a SQL query that will pull the names and birthdates of all her students. What should the FROM phrase say in her query?

FROM Students

Which of the following fields would be most important to encrypt in a customer table?

Customer's credit card number

One of Eden's customers has closed his account and moved to a different state. She needs to change his status to Inactive. What SQL command will accomplish this task?

UPDATE

Which data type would be best suited to a field that lists customer email addresses?

Hyperlink

Scarlet needs to create a file to hold a list of expenses for an upcoming project, and she needs to do some basic calculations with the numbers in the budget. Which kind of file is the best fit for this purpose?

Spreadsheet

Contact information for all the people taking a class at a school are stored in a ________ called Students.

table

Morgan needs to hire someone to help implement a business intelligence system for her company. What type of professional would be the best fit for this job?

Data analyst

Melody is building a database for a restaurant. Which pair of tables is least likely to need a direct relationship with each other?

Customers, Ingredients

Which of the following problematic behaviors relies solely on the use of digital technology?

Cyberbullying

When Hafsa writes a research paper for her psychology class, ________________ allow(s) her to quote small portions of a research study published by an industry leading expert without asking his permission first.

the fair use doctrine

Edward shares a blog post on social media that says the Centers for Disease Control (CDC) has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do?

Verify the content with an authoritative source.

Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?

Acceptable use policy (AUP)

What rules should guide your behavior when you interact with friends and coworkers on social media?

Netiquette

Alvaro is having lower back pain from working long hours on his computer. Which of the following strategies could help him solve this problem? Choose two.

Switch to a standing desk and Take frequent breaks.

Bailey reads wikis at the beginning of his research project to get his bearings on the topic. He switches to peer-reviewed journals and professional publications for his formal sources. Why does Bailey not use wikis as formal sources?

Wikis can be heavily biased.

Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?

Digital rights management (DRM)

Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________.

a hoax

Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.

digital footprint

Paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. She formats best practice tips in green, and she formats warning information in red. Which employees might struggle with this formatting?

People with color blindness

Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.

catfishing

Hunter has dyslexia and struggles to understand text when he reads it to himself. It seems assigned class readings always make more sense when someone else reads them to him. What tool can help Hunter study more independently?

Screen reader

Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________.

digital citizenship

Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports ______________.

digital inclusion

Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?

Repetitive strain injury

During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________.

the digital divide

Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?

Reset the old phone to factory settings.

Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?

Remove the battery and throw it in the trash.

Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.

digital detox

Other sets by this creator

ITE 115 EXAM 4 2

68 terms

jahsee_sele

ITE 115 4

68 terms

jahsee_sele

ITE 119 EXAM 4 T/F

83 terms

jahsee_sele

ITE 119 EXAM 3

61 terms

jahsee_sele

Verified questions

COMPUTER SCIENCE

Write a program that can be used as a math tutor for a young student. The program should display two random numbers that are to be added, such as: $$ \begin{array}{r}{247} {+     129} \hline$\end{array}$ $$ The program should wait for the student to enter the answer. If the answer is correct, a message of congratulations should be printed. If the answer is incorrect, a message should be printed showing the correct answer.

Verified answer

COMPUTER SCIENCE

Show that $E Q_{\mathrm{CFG}}$ is undecidable.

Verified answer

COMPUTER SCIENCE

T F Specialized templates work with a specific data type.

Verified answer

COMPUTER SCIENCE

Describe four benefits of virtualization.

Verified answer

Recommended textbook solutions

Which data repository type is most likely to include database tables and primary keys in its internal data structure quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Which data repository type is most likely to include database tables and primary keys in its internal data structure quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Which data repository type is most likely to include database tables and primary keys in its internal data structure quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Which data repository type is most likely to include database tables and primary keys in its internal data structure quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Which data repository type is most likely to include database tables and primary keys?

Which data repository type is most likely to include database tables and primary keys in its internal data structure? A data warehouse, is a type of database, and most use tables, indexes, keys, and SQL queries.

Which field could serve as the primary key?

Often, a unique identification number, such as an ID number or a serial number or code, serves as a primary key in a table. For example, you might have a Customers table where each customer has a unique customer ID number. The customer ID field is the primary key.

What data type would be best suited to a field that lists customer email addresses?

Names and email addresses are always of the type string, while numbers can be stored as a numerical type or as string since a string is a set of characters including digits.

Which of the following is a key aspect of database security according to the CIA triad?

Confidentiality, integrity and availability together are considered the three most important concepts within information security. Considering these three principles together within the framework of the "triad" can help guide the development of security policies for organizations.