cars LOOKING FOR CARS?


WHAT IS YOUR FAVORITE CAR?


TOYOTA5000
NISSAN6000
DODGE6500
FORD7000


CLICK ON THE IMAGE

DODGE

FORD

NISSAN

TOYOTA

links

NISSAN

DODGE

FORD

TOYOTA


E-commerce And Network Terminology

  1. computer network
  2. Internet
  3. HTML
  4. the origins of internet
  5. server
  6. LAN/WAN
  7. TCPIP
  8. HTTP
  9. ARPANET
  10. ISP
  11. XML
  12. HOST
  13. VPN
  14. BROWSER



http://www.ford.com
http://www.dodge.com
http://www.nissanusa.com/
http://www.toyota.com/
picture yes no yes yes
product quality good excellent excellent excellent
search yes no yes yes
online purchase no no yes no
special deals no yes yes no
        Price Lookup



Enter an Item to View its Price


TOYOTA, NISSAN, DODGE, FORD

Car brand:  

Price: $    

brand:      



Choose quantity:

Subtotal: $

Select Shipping Method:
Overnight (1-2 Business Days)
Standard (3-5 Business Days)

Tax:      $

Total    $





Payment option

Mastercard
discover
Visa

First Name  
Last Name   
Credit card # 



Enter your user name and password to log in

Name

Password    center>

links

FARSI TRANSLATION

BU 5010 Database Applications for Managers                                                            

Quiz 1 True / False                                                                                                        Spring 2007

 

Name______payam tafreshi________________________________

 

T  1) A database has operations such as storing, displaying, and searching for records.

 

T  2) A file should be closed before it is opened again in another operation mode.

 

 F 3) A file can be accessed sequentially as well as randomly.

 

 F 4) The most efficient way to delete from a file is to copy the entire file, excluding deleted data.

 

 T 5) Random access becomes faster if each record has a fixed length with a unique key.

 

T  6) Binary files store the binary value of a number instead of its ASCII value.

 

F 7) Modification is more difficult in arrays rather than in a sequential file.

 

T 8) It is better to store large amounts of data into an array rather than into a file.

 

 F 9) Information in an array will be lost after the program terminates.

 

T  10) In sequential files, modification requires duplication of the existing file.

 

T  11) A data file is a file in which data is stored and from which data is retrieved.

 

F 12) In random access there is no need for duplication of the file when deleting a record.

 

T  13) When deleting a record from an array, the physical storage will be deleted.

 

 F 14) It is necessary to shuffle an array upon deletion to make the insertion faster.

 

 F 15) If the array is not shuffled after deletion, it is necessary to indicate that the record was deleted.

 

T  16) A Database is a collection of related data.

 

 F 17) One person having many credit cards is an example of a many-to-many relationship.

 

 F 18) The most important function in a database is delete.

 

 F 19) A database can have at most one table.

 

T  20) The importance of normalization of a database is to eliminate waste of memory and redundancy of data.

 

T  21) Simple file encryption can be done by changing ASCII values or by using an associate array.

 

F  22) A data file is an executable file that performs a database function.

 

T  23) A database report is used by managers to enter new records to a database.

 

T  24) A Database Designer’s responsibility is to define the content, the structure, the constraints, and functions or transactions against the database.

 

T  25) A set of concepts to describe the structure and the constraints of a database is called a data object.

 

T  26) Three categories of data models are conceptual, physical, and implementation.

 

 F 27) A database schema includes descriptions of the database structure and the constraints that should hold on the database.

 

T  28) C++ is an example of a DBMS language.
 
T 29) A primary key is necessary to uniquely identify a record in a table; two records may have the same value in the field designated as primary key.
 
T 30) Creating relationships between tables increases data redundancy and makes a database less efficient.
 
T  31)  The proper C++ code to open a text file is:
ifstream studentFile("students.txt", ios::in);
 
T  32) In C++, the syntax code if (!fin) can be used instead of if (fin==NULL). 
 
 F 33) Unicode consists of 8-16 bits.
 
F  34) A database consists of many fields.
 
T  35) A load function will read all records from a file into an array and should be called at the start of a program.

 

 F 36) ifstream fin(“data.txt”,ios::in); if(!fin) cout<<”NO FILE”;  will test the file’s existence.

 

T  37) A file can be opened for both input and output such as fstream fout(“data.dat”, ios::in|ios::out);

 

T  38) ofstream outfile(“data.txt”, ios::noreplace);  prevents an existing file from being overwritten.

 

T  39) A binary search is fastest for searching a large unsorted data file.
 

 F 40) Database validation of user input is necessary for fields such as phone number and social security to ensure data integrity.

 

T  41) Sequential search is preferred over hashing because of the speed.

 

T  42) The C++ system( ) function enables the programmer to use operating system commands.

 

 F 43) In a random access file, seekg( ) is used for putting data and seekp( ) is used for getting data.

 

T  44) Access will not allow you to create a one to many relationship due to security.

 

T  45) Semantic databases are based on the grammar of the expression.

 

T  46) ifstream fin(“data.txt”, ios::in); associates a file for output access.

 

T  47) You can create CGI web databases using the following programming languages: C/C++ and Perl.

 

T  48) The three example databases are Access, SQL, and Oracle.

 

 F 49) In order for a C++ database program to read from a textfile it is not necessary to use; #include<fstream>.

 

 

 F 50) In a C++ database program, it is not required that you include the name of the textfile, in order for the program to locate it and access the data.

 

 F 51) A software package/ system to facilitate the creation and maintenance of a computerized database is known as DBA.


T  52)A DBMS doesn’t involve in any sort of program security or do any active processing.

T  53) A set of concepts to describe the structure of a database, and certain constraints that the database should obey is known as Data Model Operations.

T  54) An entity is an object that is distinguishable from other objects by a specific set of attributes.

T  55)
Using write( ) function from <fstream>, one can write an entire structure (record) to a file.


T  56)
By using a linked list the deleted record will be physically deleted.

 

T  57) Conceptual data models describe details of how data is stored in the computer.

 

T  58) The Entity Relationship Model consists of entities with no possible relation to each other.

 

T  59) In the Object Oriented Model, objects consist of data operations on the data.

 

F  60) The physical implementation of your database files at the lowest level is specified at the conceptual level.