This website uses cookies to ensure you have the best experience. Learn more

Chapter 9 Review Questions And Answers

1855 words - 8 pages

1. a) What is a database?
A database is an organized collection of related data.
b) How does an RDBMS store data?
An RDBMS stores related data in tables.

2. What is one benefit of dividing data into tables?
Dividing data into tables eliminates unnecessary data duplication, or data redundancy.

3. a) What is a database schema?
A database schema is a description of the data and the organization of the data into tables in a relational database.
b) Explain the considerations for dividing data into related groups.
Considerations for dividing data into related groups includes ...view middle of the document...

7. a) What does the size of a field indicate?
The size of a field indicates the number of characters or the type of number it can store.
b) What field size is used when a field will store numbers with a decimal portion?
Single is used to store numbers with a decimal portion.
c) What field size is used when a field will store whole numbers?
Long Integer is used to store whole numbers.

8. a) What does the format of a field determine?
The format of a field determines how the data is displayed.
b) List four numeric field formats.
· General Number
· Fixed
· Percent
· Standard
c) List three date/time field formats.
· Long
· Medium
· Short
d) Do text fields have a field format?
Text fields do not have a field format.

9. For each of the field names below, list the most appropriate data type (Text, Number, Date/Time, Currency, Memo, Yes/No, Hyperlink, and AutoNumber) Use each type only once:
a) Retail Price
b) Order Date
c) First Name
d) Product Description
e) E-Mail Address
f) Record ID
g) Delivery Time
h) Peanut Allergy
i) Quantity

10. a) What is a record?
A record is a set of data for the fields in a table.
b) Can a table contain duplicate records? Explain.
No, because a table has a field that is designated the primary key. The primary key field must contain unique values.
c) What is used in a table to ensure that records are unique?
To ensure that no two records in a table are the same, one field in each table must be designated the primary key.

11. a) What must be done to designate a primary key?
Click anywhere in the primary key field and then click Design > Primary key.
b) What is the Required option used for?
The Required option is used to ensure that each record has a primary key entry.
c) List the steps required to make two fields the primary key of a table.
1. Click the gray box to the left of the first field.
2. Hold down the Ctrl key and then click the gray box to the left of the second field.
3. Click Design > Primary Key.

12. a) What is a form?
A form is a database object used for entering records into a table and for viewing existing records.

Other Papers Like Chapter 9 Review Questions and Answers

Chapter 2 Answers to Questions - Financial Accounting

5693 words - 23 pages * Chapter 2 ANSWERS TO QUESTIONS 1. A conceptual framework is a coherent system of interrelated objectives and fundamentals that can lead to consistent standards and that prescribes the nature, function, and limits of financial accounting and financial statements. A conceptual framework is necessary in financial accounting for the following reasons: (1) It will enable the FASB to issue more useful and consistent standards in the future

International Business Chapter 9 Critical Questions

839 words - 4 pages Claudia Perez Chapter 9 (Critical Discussion Questions) 1. NAFTA has produced significant net benefits for the Canadian, Mexican, and U.S economies. Discuss. The North America Free Trade Agreement (NAFTA) was passed in 1994. Starting with eliminating the majority of taxes on products traded between the three countries fallowed with a gradual phase-out of other tariffs. The Agreement contributed to more exports. The two way trade between

Chapter 2 Review Questions Solutions

913 words - 4 pages Chapter 2 Review Questions Solutions 1. Describe and compare the six sources of software. The six sources of software identified in the textbook are: (1) information technology services firms, (2) packaged software providers, (3) vendors of enterprise solution software, (4) application service providers and managed service providers, (5) open-source software, and (6) in-house development. IT services firms help companies develop custom

Chapter 1,2,3 – Answers to Assigned End of the Chapter Questions

1234 words - 5 pages Chapter 1,2,3 – Answers to Assigned End of the Chapter Questions 1-1. Shareholder (owner) wealth maximization is the most widely cited business goal. The justification for shareholder wealth maximization is that managers are hired by the owners (shareholders) and serve as their agents. In addition, the well-being of the managers is closely tied to the wealth of the shareholders. In perfect competition, shareholder wealth maximizing

Chapter 3 Ghatt Chart Review Questions

697 words - 3 pages Review Questions - Chapter 3 Page 77 1. Contrast the following terms: a) Critical path scheduling, Gantt network diagramming, slack time Network diagramming is a critical path scheduling technique whose sequence of task activities directly affect the completion date of a project. A major strength for network diagramming is its ability to represent how completion dates can vary for activates or task and is more used that Gantt Charts

Pricinples of Information Security, Chapter 3 Review Questions

1536 words - 7 pages Week 2, Chapter 3 Name: ------------------------------------------------- Review Questions p. 114 Assignment 3          1. What is the difference between law and ethics? Laws are formally adopted rules for acceptable behavior in modern society. Ethics are socially acceptable behaviors. The key difference between laws and ethics is that laws carry the authority of a governing body, and ethics do not. Ethics in turn are based on

Principles of Security 5th Edition Chapter 1 Review Questions

844 words - 4 pages Review Questions 1. What is the difference between a threat agent and a threat? A threat agent is a specific component that represents a danger to an organization’s assets. And a threat is an object, person or entity that represents a constant danger. 2. What is the difference between vulnerability and exposure? Vulnerability is a weakness is a system that leaves the system open to attacks. Exposure is the known vulnerabilities that

Chapter 1 Review Questions

870 words - 4 pages 1. What is the difference between a threat agent and a threat? A. A threat agent is the person who facilitates the attack while the threat is a constant danger to something. 2. What is the difference between vulnerability and exposure? A. Vulnerability is a flaw within the system or a weakness, usually where the attackers attack. While Exposure is a single situation when the system is prone to be harmed. 3. How is infrastructure

10 Questions and Answers on Legal Environment

3563 words - 15 pages harm and already complained to the county authority to solve the problem, which was not addressed. The Ryders lived adjacent to the landfill, and they were experiencing the spe¬cific types of harms (fires, scavenger problems, groundwater contamination, also an intruder who entered the property through an unlocked gate) which is enough substantial and violated the federal environmental law. 3. (Chapter 4) Jen operates Jen’s Fruits & Vegetables

Please Read Chapter 10 and Answer the Following Questions:

1226 words - 5 pages Please read chapter 10 and answer the following questions: 1. (Varieties of Oligopolies) do the firms in an oligopoly act independently or interdependently? Explain your answer. 2. (Price Leadership) why might a price–leadership model of oligopoly not be an effective means of collusion in an oligopoly? * Price leadership practices violate US anti-trust laws. * The more differentiated the product is, the less effective price

Petrie's Electronics Case, Chapter 3, Questions 1, 2, and 3

932 words - 4 pages | | Petrie's Electronics Case, Chapter 3, Questions 1, 2, and 3. 1. What qualities might Jim possess that would make him a successful project manager? As stated in chapter 2 Jim had worked at Broadway Entertainment Company as a senior systems analyst. Also he shopped at Petrie’s Electronics himself on many occasions. His experiences with systems analysis along with being a customer should give him a pretty good idea of what the customers

Related Essays

Answers To Review Questions And Problems

620 words - 3 pages Answers to Review Questions and Problems 1. Matching 1) (e) 2) (i) 3) (b) 4) (h) 5) (a) 6) (c) 7) (f) 8) (g) 9) (d) 10) (j) 2. Guardianship Situation: If a person is subject to a guardianship, a determination has been made by a court that the guardian will step in to the place of the person for purposes of entering into contracts. Therefore, either the contract is void (if adjudged insane) or voidable. Further, the

Chapter 2 Review Questions

744 words - 3 pages Chapter 1 PLD Review questions Multiple choice 1. A program is a set of instructions that a computer follows to perform a task. 2. The physical devices that a computer is made of are referred to as Hardware. 3. The part of a computer that runs programs is called the CPU. 4. Today, CPUS are small chips known as Microprocessors. 5. The computer stores a program while the program is running, as well as the data that the

Chapter 6 Review Questions

541 words - 3 pages Miguel Berrios July 28, 2013 Chapter 6 Review Questions 1. How does the WBS differ from the project network? The WBS differs from the project network in several ways. The WBS is hierarchical while the project network is sequential. The work packages of the WBS are identified independently of other work packages, have definite start and finish points, require specific resources, include technical specifications and

Chapter 12 Review Questions

1571 words - 7 pages SOLUTIONS TO REVIEW QUESTIONS 1. NFPOs provide goods and/or services to society without the expectation of profit, while profit-oriented organizations provide goods and/or services with the expectation of earning a profit. Many resources are provided to NFPOs without any expectation of remuneration or repayment, including volunteer services and gifts in cash or in kind. Providers of resources to a profit-oriented organization expect