Indicate the answer choice that best completes the statement or answers the ques
ID: 3843723 • Letter: I
Question
Indicate the answer choice that best completes the statement or answers the question.
1. A form of wireless transmission called _____ is very popular for short-distance wireless communication that does not require high power.
a.
Bluetooth
b.
Microsoft Visio
c.
multipath design
d.
Wi-MAX
2. A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.
a.
local area network (LAN)
b.
wireless local area network (WLAN)
c.
metropolitan area network (MAN)
d.
storage area network (SAN)
3. Designing tables is easier if a _____ is used to show a table’s structure, fields, and primary key.
a.
distinct notation format
b.
multifaceted notation format
c.
viewport notation format
d.
standard notation format
4. Which of the following configurations has a central wireless device that is used to serve all wireless clients?
a.
The Basic Service Set (BSS)
b.
A point-of-sale (POS) terminal
c.
A data frame
d.
The OSI (Open Systems Interconnection) model
5. _____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.
a.
ASCII (American Standard Code for Information Interchange)
b.
EBCDIC (Extended Binary Coded Decimal Interchange Code)
c.
Unicode
d.
ISO (International Organization for Standardization)
6. In its wireless configuration, the _____ is similar to a hub in the local area network (LAN) star topology, except it provides network services to wireless clients instead of wired clients.
a.
Wi-Fi Alliance
b.
access point
c.
fat client
d.
data frame
7. A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.
a.
no-frills key
b.
super key
c.
secondary key
d.
foreign key
8. To bridge the gap between a database and the Internet, it is necessary to use a _____, which is software that integrates different applications and allows them to exchange data.
a.
middleware
b.
stack
c.
server
d.
firmware
9. A new system might have to interface with one or more _____, which are older systems that use outdated technology.
a.
enterprise resource planning (ERP) systems
b.
mission-critical systems
c.
legacy systems
d.
intrusion detection systems
10. _____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.
a.
Encapsulation
b.
Normalization
c.
Standardization
d.
Encryption
11. In a multi-tier system, special utility software called _____ enables the tiers to communicate and pass data back and forth.
a.
shareware
b.
middleware
c.
groupware
d.
malware
12. With a _____, users provide an example of the data requested.
a.
query language
b.
data table
c.
query by example language
d.
data frame
13. In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.
a.
primary key
b.
secondary key
c.
candidate key
d.
foreign key
14. A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.
a.
procedural language
b.
query by example language
c.
query language
d.
imperative language
15. A _____ controls database operations, including storing, retrieving, updating, and deleting data.
a.
data manipulation language
b.
data device language
c.
data definition language
d.
data query language
16. The way a network is configured is called the _____.
a.
network orientation
b.
network baseline
c.
network topology
d.
network index
17. Wireless network speed is measured in _____.
a.
Bps (bits per second)
b.
Kbps (kilobytes per second)
c.
Gbps (gigabits per second)
d.
Tbps (terabytes per second)
18. The data mining technique that relies on association rule learning is often called _____.
a.
simulated analysis
b.
virtual storage analysis
c.
strategy-oriented analysis
d.
market basket analysis
19. In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
a.
secondary key
b.
candidate key
c.
combination key
d.
foreign key
20. A _____ is a set of letters or numbers that represents a data item.
a.
business glossary
b.
data dictionary
c.
mnemonic
d.
code
Identify the letters of the choices that best match the phrases or definitions.
a.
Unified Modeling Language (UML)
b.
Cardinality
c.
Foreign key
d.
Data mining
e.
Referential integrity
f.
Subschema
g.
Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.
Entity
i.
Logical record
j.
Logical storage
21. Defines only those portions of the database that a particular system or user needs or is allowed to access
22. A coding method used on mainframe computers and high-capacity servers
23. A person, place, thing, or event for which data is collected and maintained
24. A field in one table that must match a primary key value in another table in order to establish the relationship between the two tables
25. A set of rules that avoids data inconsistency and quality problems
26. A technique used by analysts to define relationships in more detail, after drawing an initial entity-relationship diagram
27. A widely used method of visualizing and documenting software systems design
28. Could help a consumer products firm identify potential customers based on their prior purchases
29. A set of field values that describes a single person, place, thing, or event
30. A kind of storage that refers to data that a user can view, regardless of how or where the information actually is organized or stored
Indicate the answer choice that best completes the statement or answers the question.
Explanation / Answer
1. a. bluetooth
2. a. LAN
3. d. standard notation format
4. a. The Basic Service Set (BSS)
5. b. EBCDIC (Extended Binary Coded Decimal Interchange Code)
6. b. access point
7. c. secondary key
8. a. middleware
9. c. legacy systems
10. d.Encryption
11.b. middleware
12. a. query language
13. c. candidate key
14. c. query language
15. a. data manipulation language
16. c. network topology