1. Question: The database analyst (DA) _____.

    A
    monitors the performance of the database

    B
    creates and maintains the data dictionary

    C
    decides on the proper placement of fields

    D
    checks backup and recovery procedures

    Note: Not available
    1. Report
  2. Question: Match the term "field name" with their definitions.

    A
    consists of simple, English-like statements that allow users to specify the data to display, print, or store

    B
    item that contains data and the actions that read or process the data

    C
    defines the maximum number of characters a field can contain

    D
    uses the logs and/or backups to restore a database when it becomes damaged or destroyed

    E
    uniquely identifies each field

    F
    creates and maintains the data dictionary, manages security of the database, monitors the performance of the database, and checks backup and recovery procedures

    Note: Not available
    1. Report
  3. Question: Match the term "field size" with their definitions.

    A
    consists of simple, English-like statements that allow users to specify the data to display, print, or store

    B
    item that contains data and the actions that read or process the data

    C
    defines the maximum number of characters a field can contain

    D
    uses the logs and/or backups to restore a database when it becomes damaged or destroyed

    E
    uniquely identifies each field

    F
    creates and maintains the data dictionary, manages security of the database, monitors the performance of the database, and checks backup and recovery procedures

    Note: Not available
    1. Report
  4. Question: Match the term "query language" with their definitions.

    A
    consists of simple, English-like statements that allow users to specify the data to display, print, or store

    B
    item that contains data and the actions that read or process the data

    C
    defines the maximum number of characters a field can contain

    D
    uses the logs and/or backups to restore a database when it becomes damaged or destroyed

    E
    uniquely identifies each field

    F
    creates and maintains the data dictionary, manages security of the database, monitors the performance of the database, and checks backup and recovery procedures

    Note: Not available
    1. Report
  5. Question: Match the term "recovery utility" with their definitions.

    A
    consists of simple, English-like statements that allow users to specify the data to display, print, or store

    B
    item that contains data and the actions that read or process the data

    C
    defines the maximum number of characters a field can contain

    D
    uses the logs and/or backups to restore a database when it becomes damaged or destroyed

    E
    uniquely identifies each field

    F
    creates and maintains the data dictionary, manages security of the database, monitors the performance of the database, and checks backup and recovery procedures

    Note: Not available
    1. Report
  6. Question: Match the term "database administrator" with their definitions.

    A
    consists of simple, English-like statements that allow users to specify the data to display, print, or store

    B
    item that contains data and the actions that read or process the data

    C
    defines the maximum number of characters a field can contain

    D
    uses the logs and/or backups to restore a database when it becomes damaged or destroyed

    E
    uniquely identifies each field

    F
    creates and maintains the data dictionary, manages security of the database, monitors the performance of the database, and checks backup and recovery procedures

    Note: Not available
    1. Report
  7. Question: Verification is process of ?

    A
    Access

    B
    Login

    C
    Logout

    D
    Authentication

    Note: Not available
    1. Report
  8. Question: Ideally a password should be at least 8 character long and contain only words.

    A
    True

    B
    False

    Note: Not available
    1. Report
  9. Question: Which one makes messages over the Internet secure?

    A
    Firewall

    B
    Antivirus

    C
    Encryption

    D
    Search engine

    Note: Not available
    1. Report
  10. Question: What is Spam?

    A
    It is a virus which spreads through emails

    B
    It is the bulk sending of unsolicited email messages

    C
    It is a email message with files attached

    D
    It is email message securing system

    Note: Not available
    1. Report
Copyright © 2024. Powered by Intellect Software Ltd