_____ information has an age suited to its use.
In some tables, the primary key consists of multiple
fields, called a _____.
a. composite key
b. secondary key
c. key field
- _____ procedures include adding records to, modifying
records in, and deleting records from a file.
b. Range check
d. File maintenance
4. A range check _____.
a. ensures that users enter only alphabetic data into a
b. determines whether a number is within a specified
c. ensures that users enter only numeric data into a
d. verifies that a required field contains data
- All of the following are strengths of the database
approach, except _____.
a. less complexity
b. improved data integrity
c. easier access
d. reduced development time
- Because the _____ contains details about data, some
call it metadata (meta means more comprehensive). (528)
a. data mart
b. data dictionary
c. data modeler
d. data warehouse
- Many organizations adopt the _____ policy, where users’
access privileges are limited to the lowest level necessary
to perform required tasks. (531)
a. golden rule
b. principle of least privilege
c. principle of highest access
d. least order
- The database analyst (DA) _____.
a. decides on the proper placement
b. creates and maintains the data dictionary
c. monitors the performance of the database
d. checks backup and recovery procedures