TrueFalse 4 points each Highlight your answers using BOLD Bl
True/False (4 points each) Highlight your answers using BOLD Black color
1) In relational databases, think of an attribute as a \"column of a table,\" where the \"attribute names\" are column headings and \"attribute values\" are the entries.
2) Cookies can be used to track your online travels using ad placement on various Web sites.
3) If you accidentally delete a record, you can use the Undo command to reverse the action.
4) A database table may not contain multiple identical rows; all its rows must differ.
5) American privacy laws are much stricter than European laws.
6) The name of a function identifies it and must be used when the function is called.
7) The control specification of the for loop includes three operations: <initialization>, <continuation>, and <next iteration>.
8) A for loop continues as long as the <continuation> test is true.
9) The current loop iteration completes the entire body before the next iteration starts.
10) You can put a loop inside another loop.
Multiple-Choice (4 points each)
11) The key field for the student database on a campus is probably the student:
A) address
B) ID
C) phone
D) last name
12) Which is true about a row in a table?
A) A technical term for a row is a tuple.
B) A row is often called a record.
C) A row is an entity instance, defining one particular object.
D) All of the above
13) What operation takes rows from one table to create a new table?
A) Project
B) Union
C) Select
D) Difference
14) Microsoft Access follows which model for its design?
A. Flat
B. Hierarchical
C. Relational
D. Network
15) Regarding one-to-many relationships between two tables, which of the following is true?
the primary key in one table is a foreign key in the other
both tables must have the same primary key
the foreign key cannot contain duplicate values
both B and C are true
none of these are true
16) Variable names declared in a function:
A) can be used outside that function
B) cannot be changed within that function
C) can be used outside the function, but cannot be changed outside the function
D) can only be used inside that function
17) Which of the following will help protect you from phishing?
A) Open attachments only when you know who sent them and why.
B) Pay attention to the domain name of the company.
C) Only give information online when you have initiated the transaction by going to the company site.
D) All of the above
18) The inputs to a function are called:
A) identifiers
B) parameters
C) values
D) algorithms
19) Which of the following iterates 10 times?
A) for (i = 1; i < 10; i = i + 1)
B) for (i = 0; i <=10; i = i + 1)
C) for (i = 0; i <10; i = i + 1)
D) none of the above
20) A(n) C_____________ refers to the legal protection of many forms of intellectual property.
21) The first top-level D________ N_________are .com, .gov, .edu, .mil, .int, .org, and .net.
22) Software for which the program is publicly available is known as O________ S________ software.
23) E_______________ information has been recoded to hide its meaning.
24) For Many to 1 relationship, table on the left that has many and table on the right has 1. Describe how to make a connection between these 2 tables.Which side is the child table, and which side is the parent table and why? (8 points)
ypetitfr@kean.edu
Many to 1
Solution
1) TRUE
2) TRUE
3) FALSE (ROLLBACK is used in database it works as undo)
4) FALSE (Database alows identical rows)
5) TRUE
6) TRUE
7) TRUE
8) TRUE
9) TRUE
10) TRUE
11) B) ID
12) D) ALL
13) C) SELECT
14) C) RELATIONAL
15) E) Nun of the above are true (because in one-to-many primary key in one table matches with many foreign keys in other table
16) D) Can only be used inside the function
17) D) All of the above
18) B) Parametes
19) C) for(i=0;i<10;i++)
20) Copyright
21) Domain Names
22) Open Source
23) Encryption
24) For connection between tables we use join operaios in data base. for many-to-one rlation ship we use one-to-many relation by treating the tables in reverse order, for this right side is parent left side are childs


