Professional Documents
Culture Documents
Final Examination
Prepared by: Anna Roneliza M. Cena
NAME: _____________________________________________________________
2. This is the data files that contain records with no structured relationships to other files.
a.) Flat-File Approach
b.) Database Approach
c.) Legacy System
d.) Data Redundancy
4. This approach centralizes the organization’s data into a common database that is
shared by other users.
a.) Flat-File Approach
b.) Database Approach
c.) Data Definition Language
d.) Partitioned database approach
6. This is the proprietary programming language that a particular DBMS uses to retrieve,
process, and store data.
a.) Data Manipulation Language
b.) Data Definition Language
c.) IBM’s structured Query Language
d.) Database Administrator
7. This is to ensure that in the event of data lose due to unauthorized access, equipment
failure, or physical disaster the organization can recover its database.
a.) Access control
b.) Backup control
c.) Data control
d.) Biometric control
8. This is to allows the user to create a personal security program or routine to provide
more positive user identification than a single password.
a.) Recovery module
b.) Checkpoint Facility
c.) User-defined procedure
d.) Database authorization table
9. This is a permanent condition that must be resolved by special software that analyzes
each deadlock condition to determine the best solution, can result in transactions being
incompletely processed and the database being corrupted.
a.) The network Model
b.) Record Type
c.) Navigational Database
d.) Deadlock
NAME: _____________________________________________________________
2. This is the data files that contain records with no structured relationships to other files.
a.) Flat-File Approach
b.) Database Approach
c.) Legacy System
d.) Data Redundancy
4. This approach centralizes the organization’s data into a common database that is
shared by other users.
a.) Flat-File Approach
b.) Database Approach
c.) Data Definition Language
d.) Partitioned database approach
6. This is the proprietary programming language that a particular DBMS uses to retrieve,
process, and store data.
a.) Data Manipulation Language
b.) Data Definition Language
c.) IBM’s structured Query Language
d.) Database Administrator
7. This is to ensure that in the event of data lose due to unauthorized access, equipment
failure, or physical disaster the organization can recover its database.
a.) Access control
b.) Backup control
c.) Data control
d.) Biometric control
8. This is to allows the user to create a personal security program or routine to provide
more positive user identification than a single password.
a.) Recovery module
b.) Checkpoint Facility
c.) User-defined procedure
d.) Database authorization table
9. This is a permanent condition that must be resolved by special software that analyzes
each deadlock condition to determine the best solution, can result in transactions being
incompletely processed and the database being corrupted.
a.) The network Model
b.) Record Type
c.) Navigational Database
d.) Deadlock