際際滷

際際滷Share a Scribd company logo
(Q) Match the followingtermsand definitions (10min):
_____data a. data placedincontextor summarized
_____database managementsystem b. centralizedstorehouse forall datadefinitions
_____information c. facts,text,graphics,images,etc.
_____repository d. organizedcollection of relateddata
_____metadata e.includesdatadefinitionsandconstraints
_____two-tierdatabases f.textand graphical displaysthatuserinteractwith
_____constraint g. distributeddatastoresthatcan be readfrom a single source
_____database application h. support25-100 usersand the userinterface isaccessible
on the individualcomputerusers
_____database i.a software applicationusedtocreate,maintainand
provide controlledaccesstouserdatabases
_____user interface j. a rule that cannotbe violatedbydatabase users
_____file processingsystem k.applicationprogram(s)
_____multi-tierdatabases l. eachmemberof the workgrouphas a computerandthe
computersare linked by meansof a network

More Related Content

Similar to Quiz 1 (20)

DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023
VictoriaMeisel
Lesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementLesson - 02 Network Design and Management
Lesson - 02 Network Design and Management
Angel G Diaz
Concepts and Applications of Information Technology IFSM.docx
Concepts and Applications of Information Technology IFSM.docxConcepts and Applications of Information Technology IFSM.docx
Concepts and Applications of Information Technology IFSM.docx
maxinesmith73660
Software Engineering Question Bank all.pdf
Software Engineering Question Bank all.pdfSoftware Engineering Question Bank all.pdf
Software Engineering Question Bank all.pdf
karthikaparthasarath
Improve cyber resiliency and protect data from cyber ransomware threats by us...
Improve cyber resiliency and protect data from cyber ransomware threats by us...Improve cyber resiliency and protect data from cyber ransomware threats by us...
Improve cyber resiliency and protect data from cyber ransomware threats by us...
Principled Technologies
Unit 5
Unit 5Unit 5
Unit 5
vamsitricks
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
Assistant Professor
1989 Joyce: An Object-Oriented Decision Tree Builder
1989 Joyce: An Object-Oriented Decision Tree Builder1989 Joyce: An Object-Oriented Decision Tree Builder
1989 Joyce: An Object-Oriented Decision Tree Builder
Bob Marcus
Joyce: An Object-oriented Decision Tree Builder 1989
Joyce: An Object-oriented Decision Tree Builder 1989Joyce: An Object-oriented Decision Tree Builder 1989
Joyce: An Object-oriented Decision Tree Builder 1989
Bob Marcus
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
E.F. Codd (1970).  Evolution of Current Generation Database Tech.docxE.F. Codd (1970).  Evolution of Current Generation Database Tech.docx
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
jacksnathalie
Mse unit5
Mse unit5Mse unit5
Mse unit5
NikithaNag
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
IGEEKS TECHNOLOGIES
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
IJECEIAES
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
IGEEKS TECHNOLOGIES
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
IJMER
There are four types of personnel involved in a DBMS- implementers- en.docx
There are four types of personnel involved in a DBMS- implementers- en.docxThere are four types of personnel involved in a DBMS- implementers- en.docx
There are four types of personnel involved in a DBMS- implementers- en.docx
rochellej1
Custom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael CordovaCustom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael Cordova
hoolikar77
Basic computer mcqs
Basic computer mcqsBasic computer mcqs
Basic computer mcqs
AsadMehboob4
DETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWARE
DETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWAREDETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWARE
DETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWARE
IJNSA Journal
AdistributedinfrastructuresupportingpersonalizedservicesfortheMobileWeb
AdistributedinfrastructuresupportingpersonalizedservicesfortheMobileWebAdistributedinfrastructuresupportingpersonalizedservicesfortheMobileWeb
AdistributedinfrastructuresupportingpersonalizedservicesfortheMobileWeb
Jim Webb
DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023
VictoriaMeisel
Lesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementLesson - 02 Network Design and Management
Lesson - 02 Network Design and Management
Angel G Diaz
Concepts and Applications of Information Technology IFSM.docx
Concepts and Applications of Information Technology IFSM.docxConcepts and Applications of Information Technology IFSM.docx
Concepts and Applications of Information Technology IFSM.docx
maxinesmith73660
Software Engineering Question Bank all.pdf
Software Engineering Question Bank all.pdfSoftware Engineering Question Bank all.pdf
Software Engineering Question Bank all.pdf
karthikaparthasarath
Improve cyber resiliency and protect data from cyber ransomware threats by us...
Improve cyber resiliency and protect data from cyber ransomware threats by us...Improve cyber resiliency and protect data from cyber ransomware threats by us...
Improve cyber resiliency and protect data from cyber ransomware threats by us...
Principled Technologies
1989 Joyce: An Object-Oriented Decision Tree Builder
1989 Joyce: An Object-Oriented Decision Tree Builder1989 Joyce: An Object-Oriented Decision Tree Builder
1989 Joyce: An Object-Oriented Decision Tree Builder
Bob Marcus
Joyce: An Object-oriented Decision Tree Builder 1989
Joyce: An Object-oriented Decision Tree Builder 1989Joyce: An Object-oriented Decision Tree Builder 1989
Joyce: An Object-oriented Decision Tree Builder 1989
Bob Marcus
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
E.F. Codd (1970).  Evolution of Current Generation Database Tech.docxE.F. Codd (1970).  Evolution of Current Generation Database Tech.docx
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
jacksnathalie
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
IGEEKS TECHNOLOGIES
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
IJECEIAES
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
IGEEKS TECHNOLOGIES
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
IJMER
There are four types of personnel involved in a DBMS- implementers- en.docx
There are four types of personnel involved in a DBMS- implementers- en.docxThere are four types of personnel involved in a DBMS- implementers- en.docx
There are four types of personnel involved in a DBMS- implementers- en.docx
rochellej1
Custom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael CordovaCustom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael Cordova
hoolikar77
Basic computer mcqs
Basic computer mcqsBasic computer mcqs
Basic computer mcqs
AsadMehboob4
DETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWARE
DETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWAREDETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWARE
DETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWARE
IJNSA Journal
AdistributedinfrastructuresupportingpersonalizedservicesfortheMobileWeb
AdistributedinfrastructuresupportingpersonalizedservicesfortheMobileWebAdistributedinfrastructuresupportingpersonalizedservicesfortheMobileWeb
AdistributedinfrastructuresupportingpersonalizedservicesfortheMobileWeb
Jim Webb

More from Dastan Kamaran (6)

Field properties
Field propertiesField properties
Field properties
Dastan Kamaran
Create table relationships
Create table relationshipsCreate table relationships
Create table relationships
Dastan Kamaran
Field properties
Field propertiesField properties
Field properties
Dastan Kamaran
Create table relationships
Create table relationshipsCreate table relationships
Create table relationships
Dastan Kamaran
Oop lecture1-chapter1(review of java)
Oop lecture1-chapter1(review of java)Oop lecture1-chapter1(review of java)
Oop lecture1-chapter1(review of java)
Dastan Kamaran
Oop lecture1-chapter1(review of java)
Oop lecture1-chapter1(review of java)Oop lecture1-chapter1(review of java)
Oop lecture1-chapter1(review of java)
Dastan Kamaran
Create table relationships
Create table relationshipsCreate table relationships
Create table relationships
Dastan Kamaran
Create table relationships
Create table relationshipsCreate table relationships
Create table relationships
Dastan Kamaran
Oop lecture1-chapter1(review of java)
Oop lecture1-chapter1(review of java)Oop lecture1-chapter1(review of java)
Oop lecture1-chapter1(review of java)
Dastan Kamaran
Oop lecture1-chapter1(review of java)
Oop lecture1-chapter1(review of java)Oop lecture1-chapter1(review of java)
Oop lecture1-chapter1(review of java)
Dastan Kamaran

Recently uploaded (20)

Cost sheet. with basics and formats of sheet
Cost sheet. with basics and formats of sheetCost sheet. with basics and formats of sheet
Cost sheet. with basics and formats of sheet
supreetk82004
New Income Tax Bill - Capital Gains .pdf
New Income Tax Bill - Capital Gains .pdfNew Income Tax Bill - Capital Gains .pdf
New Income Tax Bill - Capital Gains .pdf
HarshilShah134194
Final_Geographical_Analysis_9-1-10 (1).pdf
Final_Geographical_Analysis_9-1-10 (1).pdfFinal_Geographical_Analysis_9-1-10 (1).pdf
Final_Geographical_Analysis_9-1-10 (1).pdf
OmkarPatilPatodekar
HIRE MUYERN TRUST HACKER FOR AUTHENTIC CYBER SERVICES
HIRE MUYERN TRUST HACKER FOR AUTHENTIC CYBER SERVICESHIRE MUYERN TRUST HACKER FOR AUTHENTIC CYBER SERVICES
HIRE MUYERN TRUST HACKER FOR AUTHENTIC CYBER SERVICES
anastasiapenova16
Certificado Business Intelligence - Alber Florentin.pdf
Certificado Business Intelligence - Alber Florentin.pdfCertificado Business Intelligence - Alber Florentin.pdf
Certificado Business Intelligence - Alber Florentin.pdf
alberalen
Lesson 6- Data Visualization and Reporting.pptx
Lesson 6- Data Visualization and Reporting.pptxLesson 6- Data Visualization and Reporting.pptx
Lesson 6- Data Visualization and Reporting.pptx
1045858
Monitoring Imam Ririn di Pilkada Kota Depok 2024
Monitoring Imam Ririn di Pilkada Kota Depok 2024Monitoring Imam Ririn di Pilkada Kota Depok 2024
Monitoring Imam Ririn di Pilkada Kota Depok 2024
Deddy Rahman
ヰ$__Cubase Pro Crack Full Activativated 2025
ヰ$__Cubase Pro Crack Full Activativated 2025ヰ$__Cubase Pro Crack Full Activativated 2025
ヰ$__Cubase Pro Crack Full Activativated 2025
abrishhayat858
PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!
PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!
PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!
Stanislava Tropcheva
Key Benefits of Implementing Contify's M&CI Platform
Key Benefits of Implementing Contify's M&CI PlatformKey Benefits of Implementing Contify's M&CI Platform
Key Benefits of Implementing Contify's M&CI Platform
Contify
2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM
2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM
2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM
Timothy Spann
Analyzing Consumer Spending Trends and Purchasing Behavior
Analyzing Consumer Spending Trends and Purchasing BehaviorAnalyzing Consumer Spending Trends and Purchasing Behavior
Analyzing Consumer Spending Trends and Purchasing Behavior
omololaokeowo1
AI-Agents-and-Environments AIML unit 1.pptx
AI-Agents-and-Environments AIML unit 1.pptxAI-Agents-and-Environments AIML unit 1.pptx
AI-Agents-and-Environments AIML unit 1.pptx
JohnWilliam111370
Kaggle & Datathons: A Practical Guide to AI Competitions
Kaggle & Datathons: A Practical Guide to AI CompetitionsKaggle & Datathons: A Practical Guide to AI Competitions
Kaggle & Datathons: A Practical Guide to AI Competitions
rasheedsrq
Getting started with the basics of python
Getting started with the basics of pythonGetting started with the basics of python
Getting started with the basics of python
asharjavidaj
gestion.pptxcdsfcsefsdfsdfdefdwefwedfewrd
gestion.pptxcdsfcsefsdfsdfdefdwefwedfewrdgestion.pptxcdsfcsefsdfsdfdefdwefwedfewrd
gestion.pptxcdsfcsefsdfsdfdefdwefwedfewrd
johngallardo981
Updated Willow 2025 Media Deck_270225.pdf
Updated Willow 2025 Media Deck_270225.pdfUpdated Willow 2025 Media Deck_270225.pdf
Updated Willow 2025 Media Deck_270225.pdf
tangramcommunication
2025 Trends: What Really Works in SEO and Content Marketing
2025 Trends: What Really Works in SEO and Content Marketing2025 Trends: What Really Works in SEO and Content Marketing
2025 Trends: What Really Works in SEO and Content Marketing
Dr. Sasidharan Murugan
How the Best News APIs Work: A Visual Guide
How the Best News APIs Work: A Visual GuideHow the Best News APIs Work: A Visual Guide
How the Best News APIs Work: A Visual Guide
Contify
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
Cost sheet. with basics and formats of sheet
Cost sheet. with basics and formats of sheetCost sheet. with basics and formats of sheet
Cost sheet. with basics and formats of sheet
supreetk82004
New Income Tax Bill - Capital Gains .pdf
New Income Tax Bill - Capital Gains .pdfNew Income Tax Bill - Capital Gains .pdf
New Income Tax Bill - Capital Gains .pdf
HarshilShah134194
Final_Geographical_Analysis_9-1-10 (1).pdf
Final_Geographical_Analysis_9-1-10 (1).pdfFinal_Geographical_Analysis_9-1-10 (1).pdf
Final_Geographical_Analysis_9-1-10 (1).pdf
OmkarPatilPatodekar
HIRE MUYERN TRUST HACKER FOR AUTHENTIC CYBER SERVICES
HIRE MUYERN TRUST HACKER FOR AUTHENTIC CYBER SERVICESHIRE MUYERN TRUST HACKER FOR AUTHENTIC CYBER SERVICES
HIRE MUYERN TRUST HACKER FOR AUTHENTIC CYBER SERVICES
anastasiapenova16
Certificado Business Intelligence - Alber Florentin.pdf
Certificado Business Intelligence - Alber Florentin.pdfCertificado Business Intelligence - Alber Florentin.pdf
Certificado Business Intelligence - Alber Florentin.pdf
alberalen
Lesson 6- Data Visualization and Reporting.pptx
Lesson 6- Data Visualization and Reporting.pptxLesson 6- Data Visualization and Reporting.pptx
Lesson 6- Data Visualization and Reporting.pptx
1045858
Monitoring Imam Ririn di Pilkada Kota Depok 2024
Monitoring Imam Ririn di Pilkada Kota Depok 2024Monitoring Imam Ririn di Pilkada Kota Depok 2024
Monitoring Imam Ririn di Pilkada Kota Depok 2024
Deddy Rahman
ヰ$__Cubase Pro Crack Full Activativated 2025
ヰ$__Cubase Pro Crack Full Activativated 2025ヰ$__Cubase Pro Crack Full Activativated 2025
ヰ$__Cubase Pro Crack Full Activativated 2025
abrishhayat858
PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!
PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!
PRGTUG Meeting: Lost in Data? Let's Chart the Way Out!
Stanislava Tropcheva
Key Benefits of Implementing Contify's M&CI Platform
Key Benefits of Implementing Contify's M&CI PlatformKey Benefits of Implementing Contify's M&CI Platform
Key Benefits of Implementing Contify's M&CI Platform
Contify
2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM
2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM
2025-03-03-Philly-AAAI-GoodData-Build Secure RAG Apps With Open LLM
Timothy Spann
Analyzing Consumer Spending Trends and Purchasing Behavior
Analyzing Consumer Spending Trends and Purchasing BehaviorAnalyzing Consumer Spending Trends and Purchasing Behavior
Analyzing Consumer Spending Trends and Purchasing Behavior
omololaokeowo1
AI-Agents-and-Environments AIML unit 1.pptx
AI-Agents-and-Environments AIML unit 1.pptxAI-Agents-and-Environments AIML unit 1.pptx
AI-Agents-and-Environments AIML unit 1.pptx
JohnWilliam111370
Kaggle & Datathons: A Practical Guide to AI Competitions
Kaggle & Datathons: A Practical Guide to AI CompetitionsKaggle & Datathons: A Practical Guide to AI Competitions
Kaggle & Datathons: A Practical Guide to AI Competitions
rasheedsrq
Getting started with the basics of python
Getting started with the basics of pythonGetting started with the basics of python
Getting started with the basics of python
asharjavidaj
gestion.pptxcdsfcsefsdfsdfdefdwefwedfewrd
gestion.pptxcdsfcsefsdfsdfdefdwefwedfewrdgestion.pptxcdsfcsefsdfsdfdefdwefwedfewrd
gestion.pptxcdsfcsefsdfsdfdefdwefwedfewrd
johngallardo981
Updated Willow 2025 Media Deck_270225.pdf
Updated Willow 2025 Media Deck_270225.pdfUpdated Willow 2025 Media Deck_270225.pdf
Updated Willow 2025 Media Deck_270225.pdf
tangramcommunication
2025 Trends: What Really Works in SEO and Content Marketing
2025 Trends: What Really Works in SEO and Content Marketing2025 Trends: What Really Works in SEO and Content Marketing
2025 Trends: What Really Works in SEO and Content Marketing
Dr. Sasidharan Murugan
How the Best News APIs Work: A Visual Guide
How the Best News APIs Work: A Visual GuideHow the Best News APIs Work: A Visual Guide
How the Best News APIs Work: A Visual Guide
Contify
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa

Quiz 1

  • 1. (Q) Match the followingtermsand definitions (10min): _____data a. data placedincontextor summarized _____database managementsystem b. centralizedstorehouse forall datadefinitions _____information c. facts,text,graphics,images,etc. _____repository d. organizedcollection of relateddata _____metadata e.includesdatadefinitionsandconstraints _____two-tierdatabases f.textand graphical displaysthatuserinteractwith _____constraint g. distributeddatastoresthatcan be readfrom a single source _____database application h. support25-100 usersand the userinterface isaccessible on the individualcomputerusers _____database i.a software applicationusedtocreate,maintainand provide controlledaccesstouserdatabases _____user interface j. a rule that cannotbe violatedbydatabase users _____file processingsystem k.applicationprogram(s) _____multi-tierdatabases l. eachmemberof the workgrouphas a computerandthe computersare linked by meansof a network