Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 15 Which of the following is an example of problems that might occur if

ID: 3606979 • Letter: Q

Question

QUESTION 15 Which of the following is an example of problems that might occur if you use a spreadsheet for data storage A. inconsistent data B. data redundency C. poor data integrity D. difficulty in data retrieval E. all of the above QUESTION 16 A table in a database contains information about employees. The portion of the table that would contain the Employee First Name for all employees would be known as Field True False QUESTION 17 hand le processing of data in a m A. applications B. managers C. end-users QUESTION 18 A table in a database contains information about employees. The portion of the table that would contain all of the information about one employee would be known as Field True False QUESTION 19 allows a physical device such as a server or computer to operate as if it was several machines A. software as a service B. unified communications C. virtual ization D. web 2.0 QUESTION 20 In a relational database, the link between two tables by a Primary Key and a Foreign Key is known as a Connection True

Explanation / Answer

Qestion 15. Ans: E. all the above.

Explaination: A. you can not specify the data format for particular column, so user can enter any type of data.

B. User can enter duplicate data.

C. Very difficult to manage data.

D. Data retrieval is not so easy like database.

16. A true.

Explaination: Table contains row and column. Here row contains all the information about employee and column or field contains a paritcular infomation about employee like firstname.

17. A . Applications

Explaination: Multiple aplications can process the data at a time.

18. B False.

Explaination: Table contains row and column. Here row contains all the information about employee and column or field contains a paritcular infomation about employee like firstname.

19. C. Virtualization.

Explaination: Virtualization creates virtual machaines which works like real machine.

20. B. False.

Explaination: Link between primary key and foreign key of tables in know as relation.

10. C. Foreign key

Explaination: unique identifier in a table in known as primary key and in related table known as foreign key.

11. A

Explaination:- DBMS provides functionalities for data creation and data manipulation.

you can create and delete database and table.

you can access data from the table, insert data into the table, delete data from table, edit data from table etc.

12. D. a database

Explaination: as explained in question 11, you can manage data easily using database.

13. B. Many to many

Explaination: Many users willing to rent the many newest movies. so its many to many relation.

14. D. Opt out

Explaination: you can uncheck the box to not set bing the default search engine.

if you check the box and continue then bing will be set as default search engine for your browser.

21. A true

Explaination: many to many relationship is complex. So to reduce complexity create a table and link all the tables by using primary key and foregin key.

22. B False

Explaination:- Dummy table contains dummy data. The table created to reduce many to many relation contains relation between tables and these data are not dummy, so this table is not dummy.

23. B True

Explaination: Copper wires carry electronic signals through it but fiber optics cables carry light signal through it and the speed of light is 300000 km/s wich is very high speed..

24. B. IP address

Explaination: When you connect your computer to internet or any network an unique ip address is assigned to for your computer which is used to identify the computer

25. B. False

Explaination: WAN stands for wide area network. It covers the large geographical area.


26. B. False

Explaination: It's connecting the commercial and residencial area so it would be called MAN(Meropolitan Area Network). Lan can be used in a single building or office.


27. C.  

28. False

Explaination: Server provides services to the client responding to client's request.


29. True

Explaination: We can use different systems and diffent technology to implement service oriented architecture.

30. False

Explaination: Organizations have their own harware and software for cloud computing. They have their own server . For example Google, Facebook etc. they have their own server.

31. A. e-mail

Explaination: Web 2.0 includes social networking, blogs, wiki, web applications etc. not e-mail service.


32. B. crowsourcing.
Explaination:- Gathers large amount of data.

33. False
Explaination: Internet is a network not an application. Applications use this network.

34. True
Explaination: cloud computing is network of resources. you can increase or decrease resources.


35. D. Firewall
Explaination: Firewall has sercurity mechanism to protect the system.


36. C. people
Explaination: people can share the secret information. so management of employee or people is also a information security.


38. D. Hactivism
Explaination: It is used to hack the infomation like article, photos, videos etc.

39. A. Phising.
Explaination: It is the attempt of getting sensetive data like username ,password etc.

41. D Confidentiality
Explaination: It allows user to use username , password or any confidential information to get access.


42. True
Explaination: Biometrics scans the unique finger prints , so used for authentication and user rights.

43. C. Private, public
Explaination: public is used for data encryption and private key is used for decryption. Only the person know th private key can decrypt the data and access the data.


44. True
Explaination: VPN creates a virtual private networks which is very secure and it uses encryption and provides a secure way to transfer data over network.


45. A. Confidentiality
Explaination: People enter their confidential data for the transaction.

46. True
Explaination: Users are required to user username and password for authentication. so it allows to prevent from unauthorized access to the system.


47. False
Explaination: Cookies stores small amount of data to the system like username or password.

48. E. all of the above.
Explaination: You infomation can be linked to your customers, you employee, your students or your bussiness partners. so you should always protect the information of all.


49. C Opt-in
Explaination: you can check the box for share your location to iTunes website.


50. E all of the above
Explaination: cookies stores small amount of data and all the given data are of small amount.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote