100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Quiz Answers

Puntuación
-
Vendido
-
Páginas
44
Grado
A+
Subido en
28-11-2022
Escrito en
2021/2022

List of all possible questions at the quiz

Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Estudio
Grado

Información del documento

Subido en
28 de noviembre de 2022
Número de páginas
44
Escrito en
2021/2022
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Chapter 6:
record
1. A database describes a database entity.

2. Data redundancy creates confusion that hampers the creation of
information systems that integrate data from different sources.
3. Which common database challenge is illustrated by a person receiving
multiple copies of an L.L. Bean catalog, each addressed to a slightly
different variation of his or her full name?
 Data duplication
C o r r e c t a n s w e r .
 Data accuracy
 Data redundancy
 Data normalization
4. Which of the following enables a DBMS to reduce data redundancy and
inconsistency?
Ability to couple program and data

 Ability to minimize isolated files with repeated data
C o r r e c t a n s w e r .
 Ability to enforce referential integrity
 Ability to create two-dimensional tables
5. A DBMS makes the:
 relational database available for different analytic views.
 physical database available for different analytic views.
 relational database available for different logical views.
 physical database available for different logical views.

6. The logical and physical views of data are combined into a single view
in a DBMS.
True
 False
7. Complicated groupings of data in a relational database need to be
adjusted to eliminate awkward many-to-many relationships.
 True
False
8. The term big data refers to all of the following except:

,  machine-generated data (i.e. from sensors).
 data from Web traffic.
 datasets with unstructured data.
 datasets with fewer than a billion records.
9. Each table in a relational database has one field that is designated as its
primary
key. When the field Supplier_Number appears in the PART table, it is called a
foreign
key and is essentially a
lookup
field to look up data about the
supplier
of a specific
part


10. Data cleansing, also known as data
scrubbing
, consists of activities for detecting and
correcting
data in a database that are incorrect, incomplete, improperly formatted, or
redundant
. Data cleansing not only corrects
errors
but also enforces
consistency
among different sets of data that originated in separate information systems.



Chapter 7:

1. In TCP/IP, IP is responsible for which of the following?
 Sequencing the transfer of packets
 Establishing an Internet connection between two computers
 Disassembling and reassembling packets during transmission
C o r r e c t a n s w e r .
 Moving packets over the network
2. What are the four layers of the TCP/IP reference model?
 Physical, Application, Internet, and Network Interface

,  Application, Transport, Internet, and Network Interface
C o r r e c t a n s w e r .
 Application, Hardware, Internet, and Network Interface
 Physical, Application, Transport, and Network Interface

3. Telephone networks are based on the same principles as
computer networks.
True
False
4. In a client/server network, a network server sets the rules of
communication for the network.
True
False
5. Two computers using TCP/IP can communicate even if they are
based on different hardware and software platforms.
True
False
6. Bandwidth is the:
 number of frequencies that can be broadcast through a medium.
 total number of bytes that can be sent through a medium per second.
 number of cycles per second that can be sent through a medium.
 difference between the highest and lowest frequencies that can be
accommodated on a single channel.
digital
7. A(n) signal is a discrete, binary waveform that transmits data coded
into two discrete states such as 1-bits and 0-bits.
encrypted
8. A VPN is an private network configured within a public network.
9. Hubs are simple devices that connect network components, sending a
packet
of data to all other connected devices. A
switch
has more
intelligence
than a
hub
and can filter and forward data to a
specified

, destination on the network.

10. Packet
switching
is a method of
slicing
digital messages into parcels called
packets
, sending the packets along different communication paths as they become available,
and then
reassembling
the packets once they arrive at their
destinations


Chapter 8:

1. Which of the following refers to policies, procedures, and technical
measures used to prevent unauthorized access, alteration, theft,
or physical damage to information systems?
 Controls
 Identity management
 Benchmarking
 Security
2. A salesperson clicks repeatedly on the online ads of a competitor
in order to drive the competitor's advertising costs up. This is an
example of:
 click fraud
 phishing
 pharming
 spoofing
Ransomw ar
3. is malware that hijacks a user's computer and demands
payment in return for giving back access.
4. Using numerous computers to inundate and overwhelm the network from
DDoS
numerous launch points is called a(n) attack.
5. Which of the following is the single greatest cause of network
security breaches?
 User lack of knowledge
C o r r e c t a n s w e r .
$13.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
treasykata

Conoce al vendedor

Seller avatar
treasykata Conestoga College
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
3 año
Número de seguidores
0
Documentos
2
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes