Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Management
Q:
A trigger is an event stored in a database that is invoked by the DBMS when specified events occur.
Q:
Describe how to use Microsoft Access and IIS in Web database processing applications.
Q:
What are XML Web Services?
Q:
How can XML be used with a DBMS?
Q:
What is XML, and why is it useful?
Q:
What is the NetBeans IDE?
Q:
Briefly describe PHP.
Q:
Define and briefly describe the function of ODBC.
Q:
What is a three-tier architecture?
Q:
What are the common differences between a Web database processing system running on the Windows operating system and one running on a Linux operating system?
Q:
Briefly describe three types of triggers.
Q:
What is a trigger?
Q:
What is a stored procedure?
Q:
When using Microsoft Access and IIS, the Web pages that access the database can be written using the ________ scripting language.
Q:
When using Microsoft Access and IIS with an ODBC data source, the ODBC data source should be a(n) ________.
Q:
When using Microsoft Access and IIS, the connection to the Access database must be provided by using a(n) ________.
Q:
When using Microsoft Access and IIS, a good basic ASCII text editor for producing HTML is ________.
Q:
Even when using Microsoft Access and IIS, we should still use a basic Web home page named ________.
Q:
NetBeans is a(n) ________.
Q:
XML stands for ________.
Q:
With PHP, we enclose PHP commands in between the ________ and ________ symbols.
Q:
According to the ODBC standard, a(n) ________ is a database and its associated DBMS, operating system, and network platform.
Q:
If the Web server and the DBMS are running on the different servers, the system has a(n) ________ architecture.
Q:
A commonly used Web server on servers running the Linux operating system is ________.
Q:
ODBC stands for ________.
Q:
Every DBMS product has a(n) ________ that allows DBMS functions to be executed from application program code.
Q:
A(n) ________ is similar to a computer program subroutine or function, but it is stored within the database.
Q:
A(n) ________ is a program stored within the DBMS that is invoked by the DBMS when a specified event occurs.
Q:
When using Microsoft Access and IIS, we can create Web pages that access the database using the popular ________ scripting language.
A) PHP
B) DSN
C) DSP
D) JSN
E) PSJ
Q:
When using Microsoft Access and IIS, a basic Web home page name that we should use even if we need to change IIS settings is:
A) AWebPage.htm.
B) index.html.
C) MyWebPage.htm.
D) MyWeb.htm.
E) MyPage.htm.
Q:
When using an ODBC data source with IIS and Microsoft Access, we should use:
A) a file data source.
B) a system data source.
C) a user data source.
D) a LAMP data source.
E) a WAMP data source.
Q:
Before running Web pages in Internet Information Server (IIS) against a Microsoft Access database, we need to create a(n):
A) OBDC data source.
B) JBDC data source.
C) OLE DB data source.
D) LAMP data source.
E) WAMP data source.
Q:
When working with Microsoft Access on a Windows operating system, a simple but usable ASCII text editor is:
A) Microsoft Word.
B) Notepad.
C) Wordpad.
D) Microsoft Frontpage.
E) Microsoft Visual Studio .NET.
Q:
XML allows a programmer to:
A) define elements.
B) use only predefined elements.
C) use only "shrink-warped," purchased programs.
D) Both A and B
E) All of the above
Q:
XML stands for:
A) Experimental Markup Language.
B) Existential Markup Language.
C) Extendable Markup Language.
D) Extensible Markup Language.
E) Extensible Marketing Language.
Q:
The final step of using a PHP connection to a DBMS is to:
A) open the connection.
B) test the connection.
C) query the database.
D) process the query results.
E) close the connection.
Q:
After getting data from a database, a PHP program needs to:
A) open the connection.
B) test the connection.
C) query the database.
D) process the query results.
E) close the connection.
Q:
To get data after opening a connection, a PHP program needs to:
A) open the connection.
B) test the connection.
C) query the database.
D) process the query results.
E) close the connection.
Q:
After trying to open a connection, a PHP connection to a DBMS needs to:
A) open the connection.
B) test the connection.
C) query the database.
D) process the query results.
E) close the connection.
Q:
The first PHP element to be created is the:
A) Command object.
B) Connection.
C) Errors collection.
D) Parameters collection.
E) RecordSet object.
Q:
In PHP, any programming language statements that are to be processed on the server must be enclosed in:
A) <!-- and --!>.
B) [php and php].
C) (php and php).
D) <?php and ?>.
E) <server> and </server>.
Q:
Which of the following is a task performed by the driver according to the ODBC standard?
A) Determines the appropriate DBMS
B) Validates the format of the ODBC command received from the application
C) Converts data source error codes into ODBC standard error codes
D) Verifies the application to the data source
E) Converts the data source into an SQL-compliant data structure
Q:
The intermediary between the application and the DBMS drivers in the ODBC architecture is the:
A) driver manager.
B) OLE DB interface.
C) ODBC driver.
D) data source.
E) database connector.
Q:
Which of the following is a function performed by the driver manager in ODBC?
A) Submit SQL statements to the data source.
B) Determine the type of DBMS that processes a given ODBC data source.
C) Load the appropriate ODBC driver into memory.
D) Convert data source error codes into ODBC error codes.
E) Both B and C
Q:
The ODBC standard defines a way to:
A) start transactions.
B) rollback transactions.
C) create a connection.
D) issue SQL commands.
E) All of the above
Q:
According to the ODBC standard, which of the following is not part of the specification of a data source?
A) The associated DBMS
B) The database
C) The driver
D) The operating system
E) The network platform
Q:
If the computer hosting the Web server is running a UNIX or Linux operating system, the Web server is probably:
A) Apache.
B) Tomcat.
C) Internet Information Server (IIS).
D) Internet Interpreter Server (IIS).
E) Information Interpreter Server (IIS).
Q:
If the computer hosting the Web server is running a Windows operating system, the Web server is probably:
A) Apache.
B) Tomcat.
C) Internet Information Services (IIS).
D) Internet Interpreter Server (IIS).
E) Information Interpreter Server (IIS).
Q:
ODBC stands for:
A) Open Database Compatibility.
B) Open Database Connectivity.
C) Open-source Database Compatibility.
D) Open-source Database Connectivity.
E) None of the above
Q:
Every DBMS product has an API, which stands for:
A) All Program Interpreter.
B) All Program Interface.
C) Application Programming Interpreter.
D) Application Programming Interface.
E) None of the above
Q:
Which of the following is true about stored procedures?
A) Stored procedures cannot be passed parameters like a regular application function.
B) Stored procedures are stored as an embedded function in the application program.
C) Stored procedures are stored in the database.
D) Stored procedures are invoked automatically by the DBMS when specific events occur.
E) All of the above are true about stored procedures.
Q:
Which of the following SQL commands cannot be used with a trigger?
A) INSERT
B) SELECT
C) UPDATE
D) DELETE
E) Both B and D
Q:
Which of the following is not a type of trigger that can be invoked before DBMS insert, update, or delete actions?
A) BEFORE triggers
B) PREVIOUS triggers
C) AFTER triggers
D) INSTEAD OF triggers
E) None of the above
Q:
When using Microsoft Access and IIS, the Web pages that access the database cannot be written using PHP.
Q:
When using Microsoft Access and IIS, the ODBC data source should be a system data source.
Q:
When using Microsoft Access and IIS, there is no need for an ODBC data source.
Q:
When using Microsoft Access and IIS, a good basic ASCII text editor for producing HTML is FrontPage.
Q:
When using Microsoft Access and IIS, the basic Web home page can be named index.html.
Q:
XML Web Services is a means for protecting and hiding elements of program functionality that otherwise would be available for misuse over the Web.
Q:
XML designers created a system that allows document structure, data content, and materialization to be mixed.
Q:
XML provides a standardized, non-customizable way to describe the content of a document.
Q:
In XML, a document author can only use the predefined XML tags.
Q:
Extensible Markup Language (XML) is becoming a standard means for defining the structure of documents and for transmitting documents from one computer to another.
Q:
A common default Web page name recognized by most Web servers is FirstPage.html.
Q:
Discuss Microsoft Access 2013 security administration.
Q:
Distinguish between reprocessing and rollforward as database recovery techniques.
Q:
Why do computers fail?
Q:
What is the difference between authentication and authorization?
Q:
What are the four transaction isolation levels?
Q:
Distinguish between statement-level consistency and transaction-level consistency.
Q:
Explain the process of using optimistic locking.
Q:
Briefly define the three problems that can occur because of concurrent processing that are addressed by resource locking.
Q:
Briefly explain the strategy of two-phased locking.
Q:
Explain the concept of an "atomic transaction."
Q:
What database administration functions help bring order to the potential chaos of the database processing environment?
Q:
When Microsoft Access 2013 uses user-level security with an Access 2003 database file, it stores the database in a(n) ________ file.
Q:
When Microsoft Access 2013 compiles VBA code in a database, the resulting file is stored using a(n) ________ file extension.
Q:
Microsoft Access 2013 can secure databases by deploying databases packaged with a(n) ________.
Q:
Microsoft Access 2013 can secure databases by using ________ to encrypt and decrypt the database files.
Q:
Microsoft Access 2013 can secure database files by storing them in a(n) ________.