
chapter 11
Authored by Dr. Maryam
Information Technology (IT)
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In designing the system security, authorization answers the question
who are you
what are you allowed to do
what is the system all about
what is your job
2.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
............ is the potential of an information system, piece of software or hardware to move from supporting a small number of users to a large number of users
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
How to design the most efficient structure using normalization. is called:
database design
overall design
detailed design
security design
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following best describes the process of data normalization?
increasing data access speed
eliminating redundancy in data
enhancing data security
improving data visualization
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
................... is a test of the design to ensure that the design chosen is the best available and that it is error-free
reliability
verification
validation
validity
6.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Design is physical representation of data while analysis is.................... representation of data
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The system design is directly constrained by:
A) user requirements
B) designer requirements
C) environmental constraints
D) A & C
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?