Company Business owner CEO Employees Q2 They enforce a size

       Company
       Business owner
       CEO
       Employees

Q2)

       They enforce a size limit.
       They check authenticity of data entered in a field.
       An error message will appear if a rule is violated.
       They protect from fraudulent practices.

Q3)

       fields.
       files.
       records.
       tables.

Q4)

       developing a database model that will support company operations.
       purchasing your hardware components.
       selecting the specific hardware characteristics based on data storage and data access requirements.
       the process of converting your ERD into tables and defining your rows and columns based your entities and attributes.

Q5)

       developing a database model that will support company operations.
       focusing on understanding the business and its functional areas or business processes.
       selecting the specific hardware characteristics based on data storage and data access requirements.
       the process of converting your ERD into tables, and defining your rows and columns based your entities and attributes.

Q6)

       a set of constraints that helps control illegal data entry.
       correcting data errors after they are entered into a table.
       duplicating a primary key in a table.
       typing data accurately into a table.

Q7)

       group of data types that describe what kind of information that may be stored in a field.
       model of the database.
       set of values.
       the set of primary and foreign keys in a database.

Q8)

       the primary key of another table.
       data uploaded from an external source.
       a field in a table.
       is a unique identifier in a related table.

Q9)

       a count of the total records in a table.
       a field which is a candidate for a primary key.
       the number of records in a relationship.
       the most important field in a table.

Q10)

       An excel upload would impact the integrity of the data based on the table design.
       Author and AuthorNew tables use the same primary key.
       More tables can be joined to either table.
       It may be used for security reasons to protect data availability.

Q1) Which of the following is an example of an entity in a business?

       Company
       Business owner
       CEO
       Employees

Q2)

Which is NOT true of validation rules?

       They enforce a size limit.
       They check authenticity of data entered in a field.
       An error message will appear if a rule is violated.
       They protect from fraudulent practices.

Q3)

Entity attributes are represented as

       fields.
       files.
       records.
       tables.

Q4)

Physical design refers to

       developing a database model that will support company operations.
       purchasing your hardware components.
       selecting the specific hardware characteristics based on data storage and data access requirements.
       the process of converting your ERD into tables and defining your rows and columns based your entities and attributes.

Q5)

Database design refers to

       developing a database model that will support company operations.
       focusing on understanding the business and its functional areas or business processes.
       selecting the specific hardware characteristics based on data storage and data access requirements.
       the process of converting your ERD into tables, and defining your rows and columns based your entities and attributes.

Q6)

Data validation refers to

       a set of constraints that helps control illegal data entry.
       correcting data errors after they are entered into a table.
       duplicating a primary key in a table.
       typing data accurately into a table.

Q7)

A domain is a

       group of data types that describe what kind of information that may be stored in a field.
       model of the database.
       set of values.
       the set of primary and foreign keys in a database.

Q8)

A foreign key is NOT

       the primary key of another table.
       data uploaded from an external source.
       a field in a table.
       is a unique identifier in a related table.

Q9)

The term cardinality refers to

       a count of the total records in a table.
       a field which is a candidate for a primary key.
       the number of records in a relationship.
       the most important field in a table.

Q10)

Based on the image, which statement does NOT describe the following one-to-one relationship?

\"Q1)

  

       An excel upload would impact the integrity of the data based on the table design.
       Author and AuthorNew tables use the same primary key.
       More tables can be joined to either table.
       It may be used for security reasons to protect data availability.

Solution

1.A

2. A

3.B

4.D

5. C

6.B

7.A

8.C

9.C

10.A

 Company Business owner CEO Employees Q2) They enforce a size limit. They check authenticity of data entered in a field. An error message will appear if a rule
 Company Business owner CEO Employees Q2) They enforce a size limit. They check authenticity of data entered in a field. An error message will appear if a rule
 Company Business owner CEO Employees Q2) They enforce a size limit. They check authenticity of data entered in a field. An error message will appear if a rule

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site