What are the functions of database management software

Assignment Help Computer Engineering
Reference no: EM131210719

Question 1
Which of the following transmission media is used in ordinary telephones?
coaxial cables
twisted pair wires
optical fiber cables
ribbon cables

Question 2
An IT company uses industry average as a standard for measuring its financial performance. Here, the industry standard is used as a(n) ________.
scheme
outline
benchmark
objective

Question 3
A wireless router has a wired connection to the network and sends radio signals from the antennae.
True
False

Question 4
How can a person check the authenticity of an e-commerce transaction?

Question 5
The Sarbanes-Oxley Act, passed in 2002, ________.
enhanced U.S. reporting standards for public companies
mandated background checks for all employees
established the Federal Deposit Insurance Corporation (FDIC) in the United States
provides for regulation of securities issued in the United States

Question 6
What are the functions of database management software (DBMS)? Name some common database management software.

Question 7
Identifying high-cost points along the supply chain is the first step to reducing operational costs.
True
False

Question 8
Decision making that draws on billions of pieces of aggregated information to reveal important trends and patterns is called ________.
intuitive decision making
unstructured decision making
uninformed decision making
data-driven decision making

Question 9
Explain Porter's value chain model and the types of activities involved in it.
3 points
Question 10
Define relational database. Why it has been predicted that the relational database will be the mainstay for organizations in the years ahead?

Question 11
While saving her word-processed academic documents, Ashley includes the subject, title, and the author's name in the properties. Which type of information is she adding to her document?
metadata
sharded data
factual data
clerical data

Question 12
Describe how Dell reduced its operating costs.

Question 13
A website that facilitates transactions by bringing together buyers and sellers from all over the world is called a(n) ________.
Intranet
e-marketplace
wide area network
virtual market

Question 14
A company resorts to discount blowouts to get rid of excess merchandise. Which of the following scenarios is most likely to have triggered this action?
decrease in inventory costs
ineffective tracking of the inventory
overestimating demand forecast accuracy
increase in the price of raw materials

Question 15
A group of musicians buy a URL, Music4Change.org for their website, which has a unique, numerical IP address assigned to it. After a year, they move their website to a new server with a different IP address. In this situation what happens to the URL of their website?
It becomes fragmented.
It remains the same.
It needs to be renamed.
It needs to be registered with the DNS again.

Question 16
Why are wireless transmission systems favored over wired transmission systems?
3 points
Question 17
Which of the following is an example of an operating system?
Mozilla Firefox
MS Access
Linux
Adobe Acrobat Reader

Question 18
The power of suppliers is high when there are many suppliers in a market.
True
False

Question 19
Carrey, the office manager for an insurance company, suspects that some of the sales representatives are submitting their travel expenses receipts twice. Which of the following would help her spot the fraudulent transactions?
non-compliance reports
exception reports
audit reports
compliance reports

Question 20
Web 2.0 is less about the ways in which people and organizations are using the web than about the technologies.
True
False

Question 21
Which of the following is a critical component of an information system?
culture
demographics
ideas
processes

Question 22
Representation of an entity in a meaningful way, which includes the attributes of the entity, is called a ________.
summary
primary key
data-set
record

 

 

Reference no: EM131210719

Questions Cloud

Why are journals and ledgers not modeled in an rea diagram : What is represented by the labeled lines connecting entities in an REA diagram? - Why are journals and ledgers not modeled in an REA diagram?
Will you receive a margin call : You buy 700 shares of stock at a price of $70 and an initial margin of 55 percent. If the maintenance margin is 40 percent, at what price will you receive a margin call?
How would you feel about its policy of not taking on debt : The bank stated that the company's 2 to 1 current ratio was not adequate. Give reasons why a 2 to 1 current ratio might not be adequate.
Has digital media influenced music : After reading under the categories in New Media and Globalization and The Impact of New Media on Intercultural Communication, apply critical thinking techniques to help Shan (2010) answer this question, "Is intercultural communication possible?" u..
What are the functions of database management software : What are functions of database management software? Name common database management software. Describe how Dell reduced its operating costs. Why are wireless transmission systems favored over wired transmission systems?
Prepare cirtoshow and drtohide that have char moving effect : This exercise is to try practice using control keys by a programming exercise to run Ike this. You can use arrow keys and other control keys to move a character within the rectangle area. Now you can make it in this way: Prepare cIrToShow and drToH..
How index locking resolves the preceding conflict : Give an example of a query or a command that would conflict with this command, such that the conflict could not be resolved by just locking individual tuples or pages, but requires index locking.
Determine total cost for each manufacturing special order : Set up the job cost sheets for Job No. J57 and Job No. K52. - Determine the total cost for each manufacturing special order for these jobs.
How would you monitor or evaluate process and progress : What would be the goals and objectives for some consultation or change effort? How would you facilitate goal setting and decision making in this organization? What are some possible interventions? How would you prioritize goals and interventions i..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Show by applying the limit test that each of the given is

show by applying the limit test that each of the following is true.a the functions fn nn-12 and gn n2 grow

  What do you mean by sensitivity analysis how would you use

what is a sensitivity analysis? how would you use it in planning for future expansions? what role does this kind of

  How would an ssa bus configuration recover

How would an SSA bus configuration recover from a single disk failure? Suppose another node fails before the first one can be fixed. How would the system recover?

  Give one huge advantage of using javascript

One huge advantage of using JavaScript is you can accept input from the visitors to your site. As a visitor adds information to your form, what would you do to control inappropriately entered values.

  Operation for circular linked list

Write down an algorithm or code segment for searching the circular linked list for a given item. Write down an algorithm or the code segment for locating nth successor of an item within a circular linked list (nth item which follows the given item ..

  Create the following symbolic equations

Create the following symbolic equations.

  What is the name generally given to that internal connector

What is the name generally given to that internal connector and give a typical example of what might connect to it.

  Discuss the relationships and implementation differences

Discuss the relationships and implementation differences among: reference monitor concept, Trusted Computing Platform Architecture (TCPA), and Microsoft Next Generation Secure Computing Base (formerly known as Palladium project and partly implemen..

  Your quality improvement circle has been assigned the task

your quality improvement circle has been assigned the task of creating a presentation regarding system security as it

  Distributed scheduling algorithms

The receiver initiated the distributed scheduling algorithms assumed task pre-emption at sender site. Devise an approach, that is receiver-initiated however non pre-emptive.

  Based on the examples in the text if you were asked to

based on the examples in the text if you were asked to formulate a plan for a regional drive-in restaurant chains

  Why it professionals to consider project cost management

Why is it important for the IT professionals to consider project cost management? What might be the result if IT professionals were to overlook this aspect of their projects.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd