Premium Essay

Pt2520

In:

Submitted By Pnepaul
Words 1054
Pages 5
BCIS / CH. 5
Study online at quizlet.com/_6dnkk

3.

4.

5.

6.

7.

8.

9.
10.

11.

12.

13.

14.

15.

16.

17.

data entry forms The _____ data model is a tool for constructing data models.

entityrelationship

A _____ is a self-describing collection of integrated records.

database

21.

_____ is an example of a personal
DBMS.

access

22.

_____ is the process of converting a data model into tables, relationships, and data constraints.

database design 23.

The _____ problem is unique to a multiuser database environment.

lost-update

_____ show data in a structured context. reports

A ______ is a collection of forms, reports, queries, and programs that process a database.

database application ______ is a popular enterprise DBMS.

DB2

______ is the most popular diagramming tool for database applications. E-R

27.

______ is the process of converting a poorly structured table into two or more well-structured tables.

normalization

28.

______ process logic that is specific to a given business record.

application programs ______ softwares assist in creating, maintaining, and manipulating databases. DBMS

A(n) _____ DBMS is designed to process large organizational and workgroup databases.

enterprise

A(n) _____ is a column or group of columns that identifies a unique row in a table.

key

All the following steps involved in transforming a data model into a relational database design except
_____.

each attribute of the entity becomes a row of the table Applications use DBMS for all of the following operations except _____ data.

exchange

20.

24.

25.

26.

29.

30.

31.

32.

Brenda wants to find a particular report query containing sales analysis of the second and third quarter. After accessing the
DBMS, she should type in the keyword into a _____ form to locate what she is looking for.
https://www.coursehero.com/file/10350813/PT2520-Final-Review/

Similar Documents

Premium Essay

Pt2520 Lab1

...Task Command 1. Slmgr.vbs -ato 2. Slmgr.vbs -did (note the GUID). 3. Slmgr.vbs -dli 4. Verify License status is set to Licensed (activated). Quick Reference for WS08 Server Core Installations Print and fold this guide to have convenient access to common commands and procedures for configuring and maintaining Server Core installations of Windows Server® 2008. Activate a server remotely Task Join a computer to a domain Command 1. Type: netdom join %computername% /domain: /userd:\ /passwordd:* 2. Restart the computer. Install an update Remove an update Type: wusa .msu /quiet Configure your server to use a proxy server Type: netsh Winhttp set proxy : Note: You cannot access the Internet through proxy servers that require a password to allow connections. Change a computer name in a domain Type: netdom renamecomputer %computername% /NewName: /userd: /passwordd:* Type: netdom renamecomputer /NewName: Type: slmgr.vbs- ato 1. Type: expand /f:* .msu c:\test 2. In C:\test, open .xml in a text editor. 3. In .xml, replace Install with Remove and save the file. 4. Type: Pkgmgr /n:.xml Change a computer name in a workgroup Activate a server locally Configure automatic updates To verify updates: : Scregedit.wsf /AU /v To enable updates: Scregedit.wsf /AU 4 To disable updates: Scregedit.wsf /AU 1 Task Change to a static IP address Command 1. Type ipconfig /all and record relevant information or redirect to a text file (ipconfig /all...

Words: 421 - Pages: 2

Premium Essay

Pt2520 Final Review

...Antonio Lemus watch Ideocracy Week 10 -Where is null.. -‘M%’ starts with M -‘%O’ ends in O -Order by A-Z - ASC Z-A – DESC -Brackets indicate inside is the same thing (first name) = firstname -*(Star) - give me everything from -‘’ (singlequote) - forces whatever is in between to be a string -SQL server authentication– -Windows server authentication– trusts -ETL – Extract Transform Load -Like – equivalent to equal sign -Distinct unique rows -Data Definitional language or DDL is the portion of sequel that is used to create or alter tables, database objects - How do you create a table – new table--create table - In which situation should you not allow nulls – required data or business rules require it…? -If you want to change a value/ foreign key value use – key word ‘update’ -If you want to delete a record/table/value – hit key word ‘delete’ -Referential integrity – when a primary key refers to a foreign key or vice versa/ all references are there. Do not have referential integrity: Foreign key with no primary key Do not have referential integrity: Primary key with no foreign key Does have referential integrity: Foreign key with primary key Does have referential integrity: Primary key with foreign key -Absence of a value - null -varchar or invarchar – strings, names, unit size, quantity Bit – yes or no - Natural key – helps protect your identity - Composite key - has to have two or more columns that make it unique -unicode refers to an...

Words: 348 - Pages: 2

Premium Essay

Pt2520 Unit 1

...Unit 1 Research Assignment | Exploring Programming Languages | Cody Tidwell | PT2520 1.) Edgar Frank “Ted” Codd was a mathematician and also a computer scientist who never stopped believing. Going for his doctorate on a scholarship from IBM, his determination was proven to many. Once he finished his Ph.D., he worked for IBM where his work truly began to take off. He was the one proposed a set of “12 Rules”, which there are actually 13 when you include the 0). In SQL Server 2012 Service Pack 1 Cumulative Update 4, it expands the supported features for SQL Server backup and restores with Windows Azure Storage. In this release, new Powershell cmdlets have been added. MICROSOFT EXPRESS FEATURES Stored Procedures-SQL Server Configuration Manager Views-Replication (as a subscriber only) Triggers-Advanced Query Optimizer Cursors-SMO/RMO Sqlcmd and osql utilities-Integration with Visual Studio 2005 Snapshot Isolation Levels-Service Broker (as a client only) Native XML support, including XQuery and XML Schemas-SQL CLR Transact-SQL language support-Multiple Active Result Sets (MARS) Dedicated Admin Connection-Import/Export Wizard ORACLE EXPRESS FEATURES Interactive reports Declarative BLOB support Enhanced report printing Adding to the theme repository Optional runtime-only installation Improved security Application date format Application builder refinements DB2 EXPRESS FEATURES Bi-temporal data management Always on transactions Enhanced security ...

Words: 316 - Pages: 2

Premium Essay

Pt2520 Database Concepts

...List the major topics for this database. The major topics of the database are: Lease Form (tracks leases of one apartment complex); Rent Payment Form (tracks rent payment of one apartment complex); Maintenance Request Form (tracks requests for maintenance and apartment manager’s resolution); Sample Quarterly Report (shows revenues and expenses of a particular building, address). STATEMENT OF WORK Project Name: Wild Wood Apartments June 21, 2014 • History: The Wild Wood Apartments are made up of 20 different complexes in Washington, Oregon, California and Idaho with each complex containing from 10 to 60 separate apartments. Leases are from 6 months to a year and the company’s practice is to hire one of the tenants to run the complex, collecting rent, conducting repairs, etc. The company requires a quarterly report to track the lease occupancy, rent payment, maintenance, and revenue and expenses; all of which is done in paper form. The forms are considered time consuming by the property managers, and the corporate office has concerns over their accuracy. A centralized database is being considered to simplify and better manage this data. • Scope: The contractor will include hardware, website, software and data storage support for the headquarters and all property offices that belong to Wild Wood Apartments. The main storage for the data will be offsite and the contractor is responsible for maintaining it. • Constraints: The contractor and the headquarters office of Wild...

Words: 706 - Pages: 3

Premium Essay

Unit 1 Lab 1.1 - 1.4 Pt2520

...Mark Henry Salvador PT2520 Nyguen Unit 1 Lab 1.2 Nouns | Major Topics | Doctors | Each doctor must have their own database for their own patients. | Patients | Each patient will require a database of information (depression state, eating, sleeping, physical and internal problems) for each time they visit twice a month for 18 months. | Drugs | Will need a way to see which patients will receive the drug and the traditional drug. | Supervisor/Researchers | Keep track of every drug that is being hand out. Researchers will need a way to keep data into a neat database so that they can see every bit of information that is required including doctor notes and which drug is being given to each patient. | Mark Henry Salvador PT2520 Nyguen Unit 1 Lab 1.3 Major Topics Requirement to track its software Licensing scheme Installation and uninstallation of software Must have a copy of software available If it must be purchased, it has to be bought History: Law requires that any business, including a school, track its software. It is important to know what software the school owns, in what versions, and what the license agreement for that software is. Scope: A database will insure that you have information on important legal and personal documentation of accounts. Objective: Create a way to track the software that is currently being installed, uninstalled and bought for faculty, staff computers, and software. Preliminary Timeline: 1st week: Figure out the...

Words: 339 - Pages: 2

Free Essay

Pt2520 Week 5 Essay

...Austin Powell PT2520 Week 5 Essay 07/16/14 Security Plan Authentication- Will designate using SQL Server, which includes a two-step log-in process that drastically improves security. The initial log-in will grant the user access to the server, there will be an additional log-in required to access the database. Due to the nature of each user having different permissions granted, SQL Server is a better choice over Windows and will require each user to enter a username and password. Authorization-SQL Server will only grant permissions to which the user is specifically given. Each permission granted is distinct and specifically granted. Roles will be established based on the permissions that are to be granted. There will be a tenant, owner, and property manager role. Once established, then the permissions will be setup and access to the various areas of the database will be given. Roles Tenants- Access will be given to such information as their lease, rental agreement, payment history, as well as any maintenance requests requested. Tenants will be allowed to change or delete information such as payment information. Owners-Access will only be given to information that pertains to the owner. Owner will have permission to only view information about leases, rental agreements, tenants and maintenance requests. Property Managers-Access to all information will be given to users of this role. Property Managers will be able to not only view but insert and...

Words: 448 - Pages: 2

Free Essay

Pt2520 Unit 7 Research Assignment

...PT2520 Database Concept Unit 7 Research Assignment 1. What are the advantages of a declarative language as opposed to a procedural language? ANSWER: The advantage of declarative programming languages is mainly two-fold. The programs are concise; this makes it easy even for non-programmers to obtain solutions. In the SQL example above, an analyst or business support person can get the desired information. Similarly, laypersons can write acceptable web pages with simple HTML and CSS commands. The second advantage of the declarative programming model is that repetitive imperative code that indicates how to solve things is provided in the computer system behind the scenes. Such code can be made highly efficient and can incorporate the best ideas from computing. It can take advantage of parallelism 2. What advantages might a procedural language have over a declarative language? ANSWER: Procedural programming is used for developing simple applications. The languages that use the procedural programming methodology include Pascal and C languages. Some of the benefits of the procedural programming methodology are: (1) Easy to read program code. (2) Easy maintainable program code as various procedures can be debugged in isolation. (3) Code is more flexible as you can change a specific procedure that gets implemented across the program. 3. Why do you think cross joins are allowed as a legitimate join? What uses can you see for joins? ANSWER: I think that a cross-join would...

Words: 324 - Pages: 2

Premium Essay

Pt2520 Unit 2 Assignment

...MATERIALS ENGINEERING ASSIGNMENT 2 By Farhan Yosuf (EAU 0710043) - December 10, 2014 INTRODUCTION Materials are elementary to the revolution of civilizations, so much that we associate ages with them. From the very basic materials used by the Stone Age civilization such as stone, clay, skins and wood to the Bronze Age where the crucial concept of alloying was formulated to the current age where we have a periodic table, a reference to all the elements discovered, enabling us to achieve the great heights that we currently achieve. So as an aerospace engineering student, the importance of study and research of strength of materials is without thought a subject of critical essence. In this document, we have focused closely on the following groups of materials: • Metals • Ceramic • Polymers • Composites We have conducted and documented research on understanding the properties, testing, treatments, processing, selection, and prevention of a variety of engineering materials. CHOICE OF COMPONENTS For the following tasks, the choice of components is: TASK 1 (LO2, P2.1) Fully heat treated Aluminum alloy 7075 (zinc-magnesium-copper-aluminum) is utilized in aircraft construction. A two stage heat treatment called precipitation hardening is used: Solution heat treatment produces a supersaturated condition. The process of "ageing" that occurs after quenching can be accelerated by heating the alloy till a second and a coherent phase is precipitated...

Words: 702 - Pages: 3

Premium Essay

Pt2520 Unit 1 Essay

...1. Why Linux is installed on only a very small fraction of desktop computers Linux is an open source software that can be downloaded free from the internet and used by the end users. Though the original creator of the software gave it freely, some firms have redesigned the operating system and sold it for profit. Other software firms have used it to create their commercial applications such as Oracle. The free availability of Linux has led to its wide use in mobile phones, enterprise software and consumer electronics. Despite its wide use for other purposes, only a small fraction has been used in desktop computers. There are various reasons why this occurs (Gallaugher, 2012). First, it is not easy to use Linux. Compared to other operating systems like Mac OS and Windows, Linux is more complicated to use. Linux is command based. Installation and use of Linux operating system require the user to know all the commands for performing each task. This makes it hard to use. The complexity of Linux can result in a high total cost of ownership (TOC) of the computers using Linux. The small number of people using Linux discourages software industries from creating software that is supported by the operating system. This means that most applications are not supported by the operating system discouraging many users (Gallaugher, 2012). Some computer users, especially in the developing countries, prefer Linux. This is because of their low incomes making it difficult for them to afford expensive...

Words: 866 - Pages: 4

Premium Essay

Pt2520 Unit 5 Assignment

...C is the number of correctly recognized words, I is the number of incorrect recognitions and N is the number of total words. A simulation of 200 runs is performed. To this end, a two small but well-known databases are used. The simulations are performed in two phases: the training phase and the testing phase. During the training phase, different words are estimated by GMM models and stored in the codebook to be used later during the testing phase. During the testing phase, unknown words are presented by GMMs and compared with the Gaussian mixture configurations available in the codebook. Then, the most similar one is considered the recognised word. The first database used is 16-bit, mono at a sampling rate of 44 KHz. Word level labelling at millisecond accuracy is done manually, this database contains 05 different speakers and 5 words chosen randomly and similar in terms of phonemes with a simple syntax (Tasto, Casa, Cosa, Suono, Tasta). Each word is pronounced once by each speaker. Thus in total, there are 25 different words used during the simulation. This database could be found online as it is used by many researchers. The second set of data is 08-bit, mono at a sampling rate of 44 KHz. This database contains 20 words and 2 speakers (one male and one female) in another language (French language). In this case the syntax of different words is relatively complex; this database is built by us in the laboratory. After feature extraction stage, an initialization step is introduced...

Words: 922 - Pages: 4

Premium Essay

Pt2520 Unit 2 Individual Assignment

...One the day we were presented with the New Destinations project, the Looney Tunes group quickly jumped the gun on the topic of promotional items. Immediately we started to brainstorm which items would be the best; we came up with carpenter pencils, tape measures, magnets, and drink cozies. Once we narrowed down our choice of promotional items, with the help of Cheri, we sided with magnets and measuring tapes. Quickly, we began to search on the Internet for websites that would give us the best deal on the two items. Found a few websites that we liked, and then started to see which one would few chosen ones would be the best. Two websites we decided not to use only because they wanted to charge more per item with adding a logo to it. Finally, Jeanese found the best website for both promotional item and we ran with it! Started the ordering process, kept up with how the items were doing, and kept Cheri in the loop. All in all, the process during this time went well and all looking forward to seeing the final products! To complete this project, we had to utilize several management skills. First, we had to collaborate. There were so many promotional products available to us, so we each had to research and then bring our results back to the group. Then we discussed and decided which products we wanted to order. Next, we had to navigate. We knew what we wanted to have accomplished and when, but we didn’t know all the small steps we needed to take to get there. As a team we made a list...

Words: 841 - Pages: 4

Premium Essay

Pt2520 Unit 2 Dl Paper

...1. What does DDL stand for? List the SQL DDL statements Data Definition Language, is used to remove database objects such as tables, indexes and users. It is necessary to be conscious of the database you are working in before issuing SQL commands such as DDL that can manipulate data. Create, alter and drop schema objects are considered DDL statements. Chapple, M. (2015). Data Defintion Language. Retrieved June 7, 2015. 2. What is a user-defined function? User defined functions in SQL is simply a programmed routine which its parameters are set by the user of a system such as a database or spreadsheet program. In order to utilize user-defined functions, the user must have been granted CREATE function permissions to create, alter or drop user-defined functions. 3. What is the relationship between a trigger and a table or view? A trigger is attached to a table which has many triggers. Triggers are automatic. They are activated immediately after any modification to a tables data. Triggers can also cascade changes through related tables within a database. The trigger uses the title_id column as a unique key to locate matching rows. Triggers can also enforce restrictions that are more complex than those defined within check constraints. Harmon, M. (2013, April 13). Retrieved June 7, 2015. 4. Summarize the key advantages of stored procedures. Stored procedures allow modular programming and faster execution to reduce network traffic. An SQL server stored procedure with the SQL...

Words: 532 - Pages: 3

Premium Essay

Pt2520 Final Answers 1/3

...reduancy refers to what database condition? The same data is recorded in more than one place in the same database. which best defines the function of a primary key uniquely identify the record what best describes the function of a foreign key. the primary key repeated in another table to show relation a database entity can be best described as: something that the something the database is concerned for, and can be added into the database which best defines the term database requirement? something a database must do to fulfill its function. which of these best defines data integrity? The accuracy and correctness of data in database database report the focus of a database the business problem it is designed to solve is called? Domain of the database. observing people at work to see how they interact with data is called. Work shadowing which of the following best describes an attribute that can be primary key? candidate key a key that consists of 2 or more attributes combined is called: Composite key which of the follow represents the advantage of natural key? a natural key belongs to and describes the attributes. what type of relationships are shown is 1-1 when u get a many to many: make a linking table that resolves the many to many into 2 1-1 relationships. domain entities weak entitiy which term best defines normalization: the process of removing anomolies which is normal form that removes all repeating groups and arrays: normal form 1 which of the follo is...

Words: 329 - Pages: 2

Premium Essay

Pt2520 Unit 5 Unit Testing Methods

...Introduction: There are many ways of developing software but of the most popular one that is being followed by a lot of companies is called waterfall model. This method is easy to flow and no matter how big the project is it can be useful. Most of the software developers use this method by capturing the requirements from the client, once the complete of set requirements are captured, the developer move on to design phase where the set of requirements have been completely designed. After designing the next step is start coding by using different programming languages. After the coding is completed, the programs must be tested. When the testing is completed, the software is delivered to the client. Once is delivered to the client there could be some issues at the customer place. If that happens then the software enters the Maintenance phase. The five different Waterfall models are: Requirements Design Coding Testing Maintenance phase Requirement: This method is one of the easiest and oldest, probably most used, most studied model. it all starts with the requirements analysis. According to (Hales, n.d.) said that the requirements analysis from the software organisation sits with the client, or the stakeholders, or the users, understand the requirements of the software, a product that is expected and what must be done. One all the requirement has been understood, it is documented very clearly and detailed into something called software Requirement specification. After...

Words: 932 - Pages: 4

Premium Essay

Pt2520 Unit 1 Exploring Programming Languages

...Exploring Programming Languages “SQL is a tool for organizing, managing, and retrieving data stored by a computer database.”¹ This tool has been around for many decades and has evolved over time much like any of today’s technology has. Below is a chart found in Chapter 3 of SQL: The Complete Reference, Third Edition showing the milestones in the development of SQL: Milestones in SQL Development | Year | Event | 1970 | Codd defines relational database model | 1974 | IBM begins System/R project | 1974 | First article describing the SEQUEL language is published | 1978 | System/R customer tests are conducted | 1979 | Oracle introduces first commercial RDBMS | 1981 | Relational Technology introduces Ingres | 1981 | IBM announces SQL/DS | 1982 | ANSI forms SQL standards committee | 1983 | IBM announces DB2 | 1986 | ANSI SQL1 standard is ratified | 1986 | Sybase introduces RDBMS for transaction processing | 1987 | ISO SQL1 standard is ratified | 1988 | Ashton-Tate and Microsoft announce SQL Server for OS/2 | 1989 | First TPC benchmark (TPC-A) is published | 1990 | TPC-B benchmark is published | 1991 | SQL Access Group database access specification is published | 1992 | Microsoft publishes ODBC specification | 1992 | ANSI SQL2 standard (SQL-92) is ratified | 1992 | TPC-C (OLTP) benchmark is published | 1993 | Specialized SQL data warehousing systems are shipped for the first time | 1993 | ODBC products are shipped for the first time | 1994...

Words: 1281 - Pages: 6