Search Header Logo

chapter 11

Authored by Dr. Maryam

Information Technology (IT)

University

Used 6+ times

chapter 11
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In designing the system security, authorization answers the question

who are you

what are you allowed to do

what is the system all about

what is your job

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

............ is the potential of an information system, piece of software or hardware to move from supporting a small number of users to a large number of users

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

How to design the most efficient structure using normalization. is called:

database design

overall design

detailed design

security design

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following best describes the process of data normalization?

increasing data access speed

eliminating redundancy in data

enhancing data security

improving data visualization

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

................... is a test of the design to ensure that the design chosen is the best available and that it is error-free

reliability

verification

validation

validity

6.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Design is physical representation of data while analysis is.................... representation of data

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The system design is directly constrained by:

A) user requirements

B) designer requirements

C) environmental constraints

D) A & C

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?