Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Question

T/F: Database connectivity software is also known as database middleware because it interfaces between the application program and the database.
click to flip
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know

Question

T/F: Usually, the native database connectivity interface provided by the vendor is not the only way to connect to a database; most current DBMS products support other database connectivity standards, the most common being ODBC.
Remaining cards (50)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

IST210Final

QuestionAnswer
T/F: Database connectivity software is also known as database middleware because it interfaces between the application program and the database. TRUE
T/F: Usually, the native database connectivity interface provided by the vendor is not the only way to connect to a database; most current DBMS products support other database connectivity standards, the most common being ODBC. TRUE
T/F: An API (application programming interface) is defined as a set of routines, protocols, and tools for building software applications. TRUE
T/F: The effects of bad database design, implementation, and management are multiplied in an environment in which transactions may be measured in hundreds of thousands per day, rather than in hundreds per day. TRUE
T/F: A database language enables the user to create database and table structures to perform basic data management chores. TRUE
T/F: SQL is considered difficult to learn; its command set has a vocabulary of more than 300 words. FALSE - easy, less than 100 words
T/F: Data type selection is usually dictated by the nature of the data and by the intended use. TRUE
T/F: SQL requires the use of the ADD command to enter data into a table. FALSE - INSERT
T/F: You cannot insert a row containing a null attribute value using SQL. FALSE
T/F: All SQL commands must be issued on a single line. FALSE
T/F: Although SQL commands can be grouped together on a single line, complex command sequences are best shown on separate lines, with space between the SQL command and the command’s components. TRUE
T/F: COUNT is designed to tally the number of non-null "values" of an attribute, and is often used in conjunction with the DISTINCT clause. TRUE
T/F: One of the major advantages of stored procedures is that they can be used to encapsulate and represent business transactions. TRUE
T/F: Stored procedures help reduce code duplication by means of code isolation and code sharing. TRUE
T/F: The DBMS must provide tools that give each level of management a different view of the data and support the required level of decision-making. TRUE
T/F: Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers. FALSE
T/F: Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure. FALSE - DBA activities
T/F: Decision support data are a snapshot of the operational data at a given point in time. TRUE
T/F: Once data enter the data warehouse, they are never removed. TRUE
The SQL command that lets you insert rows into a table is ____. INSERT
The SQL command that lets you permanently save data changes is ____. COMMIT
The SQL command that modifies an attribute’s values in one or more table’s rows is ____. UPDATE
When you issue the DELETE FROM tablename command without specifying a WHERE condition, ____. All rows will be deleted from specified table
Which of the following is used to select partial table contents? SELECT cloumnlist FROM tablelist WHERE conditionslist
Which query will output the table contents when the value of V_CODE is equal to 21344? Select P_Descript, P_Indate, P_Price, V_Code From Product Where V_Code=21344
Which query will output the table contents when the value of P_PRICE is less than or equal to 10? SELECT P_Descript, P_QOH, P_MIN, P_Price, P_INdate FROM Product WHERE P_Price <=10
A(n) ____ is an alternate name given to a column or table in any SQL statement. ALIAS
Which query uses the correct SQL syntax to list the table contents for either V_CODE = 21344 or V_CODE = 24288? SELECT P_Descript, P_Price, P_INdate, V_CODE FROM Product WHERE V_Code=21344 or V_Code=24288
The special operator used to check whether an attribute value is within a range of values is ____. IN (BETWEEN)
The special operator used to check for similar character strings is ____. LIKE
A table can be deleted from the database by using the ____ command. DROP TABLE
The SQL aggregate function that gives the number of rows containing non-null values for the given column is ____. COUNT
The query to join the P_DESCRIPT and P_PRICE fields from the PRODUCT table and the V_NAME, V_AREACODE, V_PHONE, and V_CONTACT fields from the VENDOR table where the values of V_CODE match is ____. SELECT P_Descript, P_Price,V_Name, V_Contact,V_Areacode, V_Phone FROM Product, Vendor WHERE Product.V_Code=Vendor.V_Code
When introducing a database into an organization, a(n) ______ impact is likely because the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. CULTURAL
There is a growing trend toward ____ in the data-management function. SPECIALIZATION
As a manager, the DBA must concentrate on the ______ dimensions of the database administration function. CONTROL AND PLANNING
are more detailed and specific than policies and describe the minimum requirements of a given DBA activity. STANDARDS
“All users must have passwords” is an example of a ____. POLICY
A(n) ____ plan is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time. ACCESS
_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose. CONFIDENTIALITY
_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data. CORRUPTED
_____ management is designed to limit access to the database. USER ACCESS
Some common physical security practices found in large database installations include secured entrances, password-protected workstations, ___________, closed-circuit video, and voice-recognition technology, ELECTRONIC PERSONAL BADGES
User-access management is a subset of _____. AUTHORIZED MANAGEMENT
Classifying users into _____ according to common access needs facilitates the DBA’s job of controlling and managing the access privileges of individual users. ROLES
Data mining is part of the “____” section of the business intelligence framework. KNOWLEDGE
The ________ contains business data extracted from the operational database and from external data sources. DECISION SUPPORT DATA
____ are in charge of presenting the data to the end user in a variety of ways. OPERATIONAL DATABASE
A characteristic of decision support data is ________. VERY LARGE AMOUNT OF DATA
Which of the following is true of business rules? They can serve as a communication tool between the user and designers
Most important characteristic of an entity is ________, used to uniquely identify each entity instance PRIMARY KEY
Created by: skenny009
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards