The Database Environment A shared database should: be secure. provide for backup and recovery. All of these be accurate and available. be secure. provide for backup and recovery. All of these be accurate and available. ANSWER DOWNLOAD EXAMIANS APP
The Database Environment The source of the data is sometimes called the system of record. False True False True ANSWER DOWNLOAD EXAMIANS APP
The Database Environment A database management system (DBMS) is a: software system used to create, maintain, and provide uncontrolled access to a database. software system used to create, maintain, and provide controlled access to a database. hardware system used to create, maintain, and provide controlled access to a database. hardware system used to create, maintain, and provide uncontrolled access to a database. software system used to create, maintain, and provide uncontrolled access to a database. software system used to create, maintain, and provide controlled access to a database. hardware system used to create, maintain, and provide controlled access to a database. hardware system used to create, maintain, and provide uncontrolled access to a database. ANSWER DOWNLOAD EXAMIANS APP
The Database Environment Data quality problems currently cost U.S. businesses some $60 million each year (Hudica, 2003). False True False True ANSWER DOWNLOAD EXAMIANS APP
The Database Environment An enterprise database is which of the following? A database designed to support an entire organization A database designed to support a single PC A database designed to support a relatively small group A database designed to support only users external to an organization A database designed to support an entire organization A database designed to support a single PC A database designed to support a relatively small group A database designed to support only users external to an organization ANSWER DOWNLOAD EXAMIANS APP
The Database Environment An extranet is which of the following? The use of Internet protocols with unlimited access to company data by people within an organization. The use of Internet protocols with limited access to company data by the company's customers and suppliers. The use of Internet protocols with limited access to company data by people within an organization. The use of Internet protocols with unlimited access to company data by the company's customers and suppliers. The use of Internet protocols with unlimited access to company data by people within an organization. The use of Internet protocols with limited access to company data by the company's customers and suppliers. The use of Internet protocols with limited access to company data by people within an organization. The use of Internet protocols with unlimited access to company data by the company's customers and suppliers. ANSWER DOWNLOAD EXAMIANS APP