100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Quiz Answers CA$18.76   Add to cart

Exam (elaborations)

Quiz Answers

 9 views  0 purchase

List of all possible questions at the quiz

Preview 4 out of 44  pages

  • November 28, 2022
  • 44
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (2)
avatar-seller
treasykata
Chapter 6:
record
1. A database describes a database entity.

2. Data redundancy creates confusion that hampers the creation of
information systems that integrate data from different sources.
3. Which common database challenge is illustrated by a person receiving
multiple copies of an L.L. Bean catalog, each addressed to a slightly
different variation of his or her full name?
 Data duplication
C o r r e c t a n s w e r .
 Data accuracy
 Data redundancy
 Data normalization
4. Which of the following enables a DBMS to reduce data redundancy and
inconsistency?
Ability to couple program and data

 Ability to minimize isolated files with repeated data
C o r r e c t a n s w e r .
 Ability to enforce referential integrity
 Ability to create two-dimensional tables
5. A DBMS makes the:
 relational database available for different analytic views.
 physical database available for different analytic views.
 relational database available for different logical views.
 physical database available for different logical views.

6. The logical and physical views of data are combined into a single view
in a DBMS.
True
 False
7. Complicated groupings of data in a relational database need to be
adjusted to eliminate awkward many-to-many relationships.
 True
False
8. The term big data refers to all of the following except:

,  machine-generated data (i.e. from sensors).
 data from Web traffic.
 datasets with unstructured data.
 datasets with fewer than a billion records.
9. Each table in a relational database has one field that is designated as its
primary
key. When the field Supplier_Number appears in the PART table, it is called a
foreign
key and is essentially a
lookup
field to look up data about the
supplier
of a specific
part


10. Data cleansing, also known as data
scrubbing
, consists of activities for detecting and
correcting
data in a database that are incorrect, incomplete, improperly formatted, or
redundant
. Data cleansing not only corrects
errors
but also enforces
consistency
among different sets of data that originated in separate information systems.



Chapter 7:

1. In TCP/IP, IP is responsible for which of the following?
 Sequencing the transfer of packets
 Establishing an Internet connection between two computers
 Disassembling and reassembling packets during transmission
C o r r e c t a n s w e r .
 Moving packets over the network
2. What are the four layers of the TCP/IP reference model?
 Physical, Application, Internet, and Network Interface

,  Application, Transport, Internet, and Network Interface
C o r r e c t a n s w e r .
 Application, Hardware, Internet, and Network Interface
 Physical, Application, Transport, and Network Interface

3. Telephone networks are based on the same principles as
computer networks.
True
False
4. In a client/server network, a network server sets the rules of
communication for the network.
True
False
5. Two computers using TCP/IP can communicate even if they are
based on different hardware and software platforms.
True
False
6. Bandwidth is the:
 number of frequencies that can be broadcast through a medium.
 total number of bytes that can be sent through a medium per second.
 number of cycles per second that can be sent through a medium.
 difference between the highest and lowest frequencies that can be
accommodated on a single channel.
digital
7. A(n) signal is a discrete, binary waveform that transmits data coded
into two discrete states such as 1-bits and 0-bits.
encrypted
8. A VPN is an private network configured within a public network.
9. Hubs are simple devices that connect network components, sending a
packet
of data to all other connected devices. A
switch
has more
intelligence
than a
hub
and can filter and forward data to a
specified

, destination on the network.

10. Packet
switching
is a method of
slicing
digital messages into parcels called
packets
, sending the packets along different communication paths as they become available,
and then
reassembling
the packets once they arrive at their
destinations


Chapter 8:

1. Which of the following refers to policies, procedures, and technical
measures used to prevent unauthorized access, alteration, theft,
or physical damage to information systems?
 Controls
 Identity management
 Benchmarking
 Security
2. A salesperson clicks repeatedly on the online ads of a competitor
in order to drive the competitor's advertising costs up. This is an
example of:
 click fraud
 phishing
 pharming
 spoofing
Ransomw ar
3. is malware that hijacks a user's computer and demands
payment in return for giving back access.
4. Using numerous computers to inundate and overwhelm the network from
DDoS
numerous launch points is called a(n) attack.
5. Which of the following is the single greatest cause of network
security breaches?
 User lack of knowledge
C o r r e c t a n s w e r .

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller treasykata. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$18.76. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76449 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$18.76
  • (0)
  Add to cart