logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Database Systems Comments

  • Question
  • A compound key


  • Options
  • A. is made up a several pieces of information
  • B. uniquely identifies an item in a list
  • C. both (a) and (b)
  • D. is a combination of each unique key
  • E. None of the above

  • Correct Answer
  • both (a) and (b) 


  • Database Systems problems


    Search Results


    • 1. In SQL, which command is used to create a database user?

    • Options
    • A. ADD USER TO DATABASE
    • B. MK USER
    • C. CREATE USER
    • D. All of the above
    • E. None of the above
    • Discuss
    • 2. In SQL, which command(s) is(are) used to create a synonym for a schema object?

    • Options
    • A. CREATE SCHEMA
    • B. CREATE SYNONYM
    • C. CREATE SAME
    • D. All of the above
    • E. None of the above
    • Discuss
    • 3. A set of programs that handle a firm's data base responsibilities is called a

    • Options
    • A. Data Base Management System (DBMS)
    • B. Data Base Processing System (DBPS)
    • C. Data Management System (DMS)
    • D. All of the above
    • E. None of the above
    • Discuss
    • 4. An operation that will increase the length of a list is

    • Options
    • A. Insert
    • B. Look-up
    • C. Modify
    • D. All of the above
    • E. None of the above
    • Discuss
    • 5. Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?

    • Options
    • A. report writer
    • B. query language
    • C. data manipulation language
    • D. transaction log
    • E. None of the above
    • Discuss
    • 6. With respect to data input, the most accurate description of batch control is

    • Options
    • A. dividing documents to be entered into batches
    • B. controlling the input of each input clerk
    • C. comparing to a pre-calculated figure the total of a data item summed across a batch records put into the system
    • D. All of the above
    • E. None of the above
    • Discuss
    • 7. Data security threats include

    • Options
    • A. hardware failure
    • B. privacy invasion
    • C. fraudulent manipulation of data
    • D. All of the above
    • E. None of the above
    • Discuss
    • 8. A computer file contains several records. What does each record contain?

    • Options
    • A. Bytes
    • B. Words
    • C. Fields
    • D. Database
    • E. None of the above
    • Discuss
    • 9. If you want your database to include methods, you should use a _____ database.

    • Options
    • A. Network
    • B. Distributed
    • C. Hierarchical
    • D. Object-Oriented
    • E. None of the above
    • Discuss
    • 10. The language used in application programs to request data from the DBMS is referred to as the

    • Options
    • A. DML
    • B. DDL
    • C. query language
    • D. All of the above
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment