Case-Based Critical Thinking QuestionsCase 9-2Latham works in the logistics department for a large city bus system. As routes are changed, Latham accesses the internal database to ensure all records are accurate. The Bus Route System database includes a one-to-many relationship between the Bus Number and the Bus Routes with Bus ID as the common field. This allows the two tables to be joined to create a query based on data from both tables: Bus Number and Bus Routes.
The relationship between the Bus Number and the Bus Routes tables is one-to-many which means that each Bus Route record is connected to _____ Bus Number record(s).
A. at most one
B. at least one
C. exactly one
D. zero, one, or more
Answer: A
You might also like to view...
The constructor function always has the same name as
a. the first private data member b. the first public data member c. the class d. the first object of the class e. None of these
Double-clicking the Hand tool on the Tools panel also fits the image on the screen.
Answer the following statement true (T) or false (F)
?Program documentation _____.
A. ?describes the inputs, outputs, and processing logic for all program modules B. ?consists of instructions and information to users who will interact with the system and includes user manuals, help screens, programs, and online tutorials C. ?includes data dictionary entries, data flow diagrams, screen layouts, and the systems request that initiated the program D. ?creates links within the program that will take a user to the appropriate documentation
Pete, a security analyst, has been informed that the development team has plans to develop an application which does not meet the company's password policy. Which of the following should Pete do NEXT?
A. Contact the Chief Information Officer and ask them to change the company password policy so that the application is made compliant. B. Tell the application development manager to code the application to adhere to the company's password policy. C. Ask the application development manager to submit a risk acceptance memo so that the issue can be documented. D. Inform the Chief Information Officer of non-adherence to the security policy so that the developers can be reprimanded.