Skip to main content

INF503 Week 8 Quize's

Started onSaturday, March 5, 2022, 1:28 AM
StateFinished
Completed onSaturday, March 5, 2022, 1:39 AM
Time taken11 mins 9 secs
Grade196.00 out of 200.00 (98%)

Question 1

Correct
4.00 points out of 4.00
Flag question

Question text

A _____ is a character or group of characters that has a specific meaning.
Select one:
a.
database
b.
field
Correct
c.
file
d.
record

Feedback

Question 2

Correct
4.00 points out of 4.00
Flag question

Question text

In the _____ model, the basic logical structure is represented as an upside-down tree.
Select one:
a.
network
b.
relational
c.
hierarchical
Correct
d.
entity relationship

Feedback

Question 3

Correct
4.00 points out of 4.00
Flag question

Question text

In the _____ model, the user perceives the database as a collection of records in 1:M relationships, where each record can have more than one parent.
Select one:
a.
network
Correct
b.
object-oriented
c.
hierarchical
d.
entity relationship

Feedback

Question 4

Correct
4.00 points out of 4.00
Flag question

Question text

MySQL is an example of the _____.
Select one:
a.
hierarchical model
b.
relational data model
Correct
c.
XML data model
d.
file system data model

Feedback

Question 5

Correct
4.00 points out of 4.00
Flag question

Question text

A _____ is a collection of related records.
Select one:
a.
schema
b.
file
Correct
c.
field
d.
column

Feedback

Question 6

Correct
4.00 points out of 4.00
Flag question

Question text

A _____ is a logically connected set of one or more fields that describes a person, place, or thing.
Select one:
a.
database
b.
file
c.
column
d.
record
Correct

Feedback

Question 7

Correct
4.00 points out of 4.00
Flag question

Question text

A data warehouse contains historical data obtained from the _____.
Select one:
a.
workgroup databases
b.
enterprise databases
c.
operational databases
Correct
d.
desktop database

Feedback

Question 8

Correct
4.00 points out of 4.00
Flag question

Question text

A desktop database is a _____ database.
Select one:
a.
workgroup
b.
distributed
c.
multiuser
d.
single-user
Correct

Feedback

Question 9

Correct
4.00 points out of 4.00
Flag question

Question text

Each table _____ represents an attribute.
Select one:
a.
dimension
b.
row
c.
value
d.
column
Correct

Feedback

Question 10

Correct
4.00 points out of 4.00
Flag question

Question text

In a database context, a(n) _____ indicates the use of different names to describe the same attribute.
Select one:
a.
homonym
b.
entity
c.
synonym
Correct
d.
duplicate

Feedback

Question 11

Correct
4.00 points out of 4.00
Flag question

Question text

In a database context, the word _____ indicates the use of the same attribute name to label different attributes.
Select one:
a.
synonym
b.
homonym
Correct
c.
duplicate
d.
redundancy

Feedback

Question 12

Correct
4.00 points out of 4.00
Flag question

Question text

In the entity relationship diagram (ERD), cardinality is indicated using the _____ notation, where max is the maximum number of associated entities and min represents the minimum number of associated entities.
Select one:
a.
{min|max}
b.
[min ... max]
c.
(min, max)
Correct
d.
(max, min)

Feedback

Question 13

Correct
4.00 points out of 4.00
Flag question

Question text

Knowing the minimum and maximum number of _____ occurrences is very helpful at the application software level.
Select one:
a.
attribute
b.
object
c.
entity
Correct
d.
data

Feedback

Question 14

Correct
4.00 points out of 4.00
Flag question

Question text

The _____ notation of entity-relationship modelling can be used for both conceptual and implementation modelling.
Select one:
a.
UML
Correct
b.
Bachman
c.
Crow's Foot
d.
Chen

Feedback

Question 15

Correct
4.00 points out of 4.00
Flag question

Question text

Overlapping subtypes are subtypes that contain _____ subsets of the supertype entity set.
Select one:
a.
exclusive
b.
solitary
c.
nonunique
Correct
d.
null

Feedback

Question 16

Correct
4.00 points out of 4.00
Flag question

Question text

The _____ depicts the arrangement of higher-level entity supertypes (parent entities) and lower-level entity subtypes (child entities).
Select one:
a.
specialization hierarchy
Correct
b.
inheritance
c.
subtype discriminator
d.
entity supertype

Feedback

Question 17

Correct
4.00 points out of 4.00
Flag question

Question text

The "_____" characteristic of a primary key states that the primary key should not have embedded semantic meaning. 
Select one:
a.
unique values
b.
nonintelligent
Correct
c.
preferably single-attribute
d.
security-compliant

Feedback

Question 18

Correct
4.00 points out of 4.00
Flag question

Question text

From a system functionality point of view, _____ attribute values can be calculated when they are needed to write reports or invoices.
Select one:
a.
granular
b.
historical
c.
derived
Correct
d.
atomic

Feedback

Question 19

Correct
4.00 points out of 4.00
Flag question

Question text

Granularity refers to _____.
Select one:
a.
the level of detail represented by the values in a table's row
Correct
b.
the size of a table
c.
the number of rows in a table
d.
the number of attributes represented in a table

Feedback

Question 20

Correct
4.00 points out of 4.00
Flag question

Question text

If a table has multiple candidate keys and one of those candidate keys is a composite key, the table can have _____ based on this composite candidate key even when the primary key chosen is a single attribute.
Select one:
a.
redundancies
b.
time-variances
c.
partial dependencies
Correct
d.
Boyce-Codd normal forms

Feedback

Question 21

Correct
4.00 points out of 4.00
Flag question

Question text

The _____ function returns the current system date in MS Access.
Select one:
a.
SYSDATE()
b.
DATE()
Correct
c.
TODAY()
d.
TO_DATE()

Feedback

Question 22

Correct
4.00 points out of 4.00
Flag question

Question text

The Oracle _____ function compares an attribute or expression with a series of values and returns an associated value or a default value if no match is found.
Select one:
a.
NVL
b.
DECODE
Correct
c.
CONVERT
d.
TO_CHAR

Feedback

Question 23

Correct
4.00 points out of 4.00
Flag question

Question text

The special operator used to check whether a subquery returns any rows is _____.
Select one:
a.
BETWEEN
b.
EXISTS
Correct
c.
IN
d.
LIKE

Feedback

Question 24

Correct
4.00 points out of 4.00
Flag question

Question text

The Oracle string concatenation function is _____.
Select one:
a.
+
b.
CONCAT
c.
&&
d.
||
Correct

Feedback

Question 25

Correct
4.00 points out of 4.00
Flag question

Question text

The PL/SQL block starts with the _____ section.
Select one:
a.
DECLARE
Correct
b.
OPEN
c.
IS
d.
BEGIN

Feedback

Question 26

Correct
4.00 points out of 4.00
Flag question

Question text

The tables on which a view, or a virtual table derived from a SELECT query, are based are called _____ tables.
Select one:
a.
relation
b.
indexed
c.
base
Correct
d.
core

Feedback

Question 27

Correct
4.00 points out of 4.00
Flag question

Question text

The database contents are loaded during the _____ phase of the Systems Development Life Cycle (SDLC).
Select one:
a.
maintenance
b.
implementation
Correct
c.
analysis
d.
detailed systems design

Feedback

Question 28

Correct
4.00 points out of 4.00
Flag question

Question text

The first step in developing the conceptual model using ER diagrams is to _____.
Select one:
a.
define the attributes, primary keys, and foreign keys for each of the entities
b.
identify, analyze, and refine the business rules
Correct
c.
normalize the entities
d.
complete the initial ER diagram

Feedback

Question 29

Correct
4.00 points out of 4.00
Flag question

Question text

The first step in the ER model verification process is to _____.
Select one:
a.
identify each module and its components
b.
identify each module's internal transaction requirements
c.
verify all processes against the ER model
d.
identify the ER model's central entity
Correct

Feedback

Question 30

Correct
4.00 points out of 4.00
Flag question

Question text

In the optimistic approach, during the_____ phase, a transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values.
Select one:
a.
write
b.
validation
c.
read
Correct
d.
shared

Feedback

Question 31

Correct
4.00 points out of 4.00
Flag question

Question text

In the wait/die scheme, the:
Select one:
a.
older transaction waits for the younger one to complete and release its locks.
Correct
b.
older transaction rolls back the younger transaction and reschedules it.
c.
younger, preempted transaction is rescheduled using the same time stamp.
d.
younger and older transactions both wait indefinitely to be released.

Feedback

Question 32

Correct
4.00 points out of 4.00
Flag question

Question text

Lock _____ indicates the level of lock use.
Select one:
a.
granularity
Correct
b.
serializability
c.
growing
d.
shrinking

Feedback

Question 33

Correct
4.00 points out of 4.00
Flag question

Question text

Knowing the sparsity of a column helps you decide whether the use of _____ is appropriate.
Select one:
a.
a full table scan
b.
query optimization
c.
an index
Correct
d.
query processing

Feedback

Question 34

Correct
4.00 points out of 4.00
Flag question

Question text

On the server side, the database environment must be properly configured to respond to clients' requests in the fastest way possible, while making optimum use of existing resources. The activities required to achieve this goal are commonly referred to as _____ tuning.
Select one:
a.
DBMS performance
Correct
b.
database SQL
c.
client and server
d.
SQL performance

Feedback

Question 35

Correct
4.00 points out of 4.00
Flag question

Question text

The _____ process analyzes SQL queries and finds the most efficient way to access data.
Select one:
a.
listener
b.
optimizer
Correct
c.
user
d.
scheduler

Feedback

Question 36

Correct
4.00 points out of 4.00
Flag question

Question text

A centralized database management is subject to a problem such as _____.
Select one:
a.
growing numbers of remote locations
Correct
b.
organizational flexibility of the database
c.
maintaining and operating small database systems
d.
dependence on multiple sites

Feedback

Question 37

Correct
4.00 points out of 4.00
Flag question

Question text

A database management system needs _____ to prepare the data for presentation to the end user or to an application program.
Select one:
a.
I/O interface
b.
security
c.
concurrency control
d.
formatting
Correct

Feedback

Question 38

Correct
4.00 points out of 4.00
Flag question

Question text

A disadvantage of a distributed database management system (DDBMS) is:
Select one:
a.
processor dependence.
b.
lack of standards.
Correct
c.
site additions affects other operations.
d.
slower data access.

Feedback

Question 39

Correct
4.00 points out of 4.00
Flag question

Question text

Decision support data tends to be non-normalized, _____, and pre-aggregated.
Select one:
a.
duplicated
Correct
b.
optimized
c.
sorted
d.
unique

Feedback

Question 40

Correct
4.00 points out of 4.00
Flag question

Question text

From a data analyst's point of view, decision support data differ from operational data in three main areas: time span, granularity, and _____.
Select one:
a.
dimensionality
Correct
b.
usability
c.
transaction processing
d.
sparsity

Feedback

Question 41

Correct
4.00 points out of 4.00
Flag question

Question text

In a star schema, attributes are often used to search, filter, or classify _____.
Select one:
a.
dimensions
b.
tables
c.
sales
d.
facts
Correct

Feedback

Question 42

Correct
4.00 points out of 4.00
Flag question

Question text

Document databases group documents into logical groups called ______.
Select one:
a.
buckets
b.
blocks
c.
sets
d.
collections
Correct

Feedback

Question 43

Incorrect
0.00 points out of 4.00
Flag question

Question text

Graph theory is a mathematical and computer science field that models relationships, or edges, between objects called ______.
Select one:
a.
buckets
b.
scales
c.
nodes
d.
maps
Incorrect

Feedback

Question 44

Correct
4.00 points out of 4.00
Flag question

Question text

In the context of Big Data, ______ relates to changes in meaning.
Select one:
a.
variety
b.
viability
c.
variability
Correct
d.
veracity

Feedback

Question 45

Correct
4.00 points out of 4.00
Flag question

Question text

In the ODBC architecture, a(n) _____ is in charge of managing all database connections.
Select one:
a.
ODBC API
b.
DLL
c.
driver manager
Correct
d.
ODBC driver

Feedback

Question 46

Correct
4.00 points out of 4.00
Flag question

Question text

One of the advantages of _____ over other middleware is that it requires no configuration on the client side.
Select one:
a.
JDBC
Correct
b.
OLE-DB
c.
ADO.NET
d.
ODBC

Feedback

Question 47

Correct
4.00 points out of 4.00
Flag question

Question text

The _____ is an advanced data definition language that is used to describe the structure of XML data documents.
Select one:
a.
XHTML
b.
HTML schema
c.
DTD
d.
XML schema
Correct

Feedback

Question 48

Correct
4.00 points out of 4.00
Flag question

Question text

At the level of middle management, the database must be able to provide _____.
Select one:
a.
feedback to monitor whether a company is achieving its goals
b.
access to external and internal data to identify growth opportunities
c.
data necessary for tactical decisions and planning
Correct
d.
frameworks for defining and enforcing organizational policies

Feedback

Question 49

Correct
4.00 points out of 4.00
Flag question

Question text

Coordinating, monitoring, and allocating database administration resources is included in a DBA's _____ role.
Select one:
a.
managerial
Correct
b.
operative
c.
technical
d.
arbitration

Feedback

Question 50

Correct
4.00 points out of 4.00
Flag question

Question text

Database administration operations are commonly defined and divided according to the phases of the _____.
Select one:
a.
SLA
b.
DBLC
Correct
c.
SDLC
d.
MRA

Feedback

Started onSaturday, March 5, 2022, 1:15 AM
StateFinished
Completed onSaturday, March 5, 2022, 1:22 AM
Time taken7 mins 40 secs
Grade19.00 out of 20.00 (95%)

Question 1

Correct
1.00 points out of 1.00
Flag question

Question text

Another name for a database server-side extension program is _____.
Select one:
a.
web-to-database middleware
Correct
b.
web application middleware
c.
database application server
d.
web server

Feedback

Question 2

Correct
1.00 points out of 1.00
Flag question

Question text

"All users must have passwords" is an example of a _____.
Select one:
a.
policy
Correct
b.
procedure
c.
rule
d.
standard

Feedback

Question 3

Correct
1.00 points out of 1.00
Flag question

Question text

_____ is a collection of technologies used to access any type of data source and manage the data through a common interface.
Select one:
a.
ODBC
b.
OLE-DB
c.
UDA
Correct
d.
DAO

Feedback

Question 4

Correct
1.00 points out of 1.00
Flag question

Question text

_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.
Select one:
a.
Security auditing and monitoring
b.
System support
Correct
c.
Backup and recovery
d.
Performance monitoring and tuning

Feedback

Question 5

Correct
1.00 points out of 1.00
Flag question

Question text

_____ is a higher-level, object-oriented application interface used to access remote database servers.
Select one:
a.
RDO
Correct
b.
DAO
c.
UDA
d.
ODBC

Feedback

Question 6

Correct
1.00 points out of 1.00
Flag question

Question text

_____ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.
Select one:
a.
Information engineering (IE)
Correct
b.
Business Intelligence
c.
MOLAP
d.
Access Management

Feedback

Question 7

Correct
1.00 points out of 1.00
Flag question

Question text

A data administrator is also known as a(n) _____.
Select one:
a.
data security officer
b.
information engineering officer
c.
systems administrator
d.
information resource manager
Correct

Feedback

Question 8

Correct
1.00 points out of 1.00
Flag question

Question text

_____ CASE tools provide support for the planning, analysis, and design phases.
Select one:
a.
Vertical
b.
Horizontal
c.
Front-end
Correct
d.
Back-end

Feedback

Question 9

Correct
1.00 points out of 1.00
Flag question

Question text

"A password must have a minimum of five characters" is an example of a _____.
Select one:
a.
rule
b.
procedure
c.
standard
Correct
d.
policy

Feedback

Question 10

Correct
1.00 points out of 1.00
Flag question

Question text

_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.
Select one:
a.
Confidentiality
Correct
b.
Availability
c.
Integrity
d.
Compliance

Feedback

Question 11

Correct
1.00 points out of 1.00
Flag question

Question text

_____ is a scripting language that allows web authors to design interactive sites.
Select one:
a.
HTML
b.
JavaScript
Correct
c.
Java
d.
Visual Basic

Feedback

Question 12

Correct
1.00 points out of 1.00
Flag question

Question text

_____ is a web application server that provides the ability to connect web servers to multiple data sources.
Select one:
a.
ColdFusion/JRun
Correct
b.
dBase
c.
MS Access
d.
FoxPro

Feedback

Question 13

Correct
1.00 points out of 1.00
Flag question

Question text

_____ is an object-oriented programming language developed by Sun Microsystems that runs on top of web browser software.
Select one:
a.
Java
Correct
b.
JavaScript
c.
VBScript
d.
Visual Basic

Feedback

Question 14

Correct
1.00 points out of 1.00
Flag question

Question text

A(n) _____ can use a shared connection to the database instead of creating a new one every time.
Select one:
a.
API
Correct
b.
HTTP GET request
c.
web browser
d.
DLL

Feedback

Question 15

Correct
1.00 points out of 1.00
Flag question

Question text

_____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.
Select one:
a.
Guidelines
b.
Documentations
c.
Procedures
d.
Standards
Correct

Feedback

Question 16

Correct
1.00 points out of 1.00
Flag question

Question text

_____ code is embedded inside an HTML page and is activated by triggering events such as clicking on a link.
Select one:
a.
Visual Basic
b.
VBScript
Correct
c.
SQL
d.
XML

Feedback

Question 17

Correct
1.00 points out of 1.00
Flag question

Question text

_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
Select one:
a.
Debilitative
b.
Preserving
c.
Corrupting
Correct
d.
Destructive

Feedback

Question 18

Correct
1.00 points out of 1.00
Flag question

Question text

Among client-side extensions, _____ is a Microsoft specification for writing programs that run inside the Internet Explorer browser.
Select one:
a.
ActiveX
Correct
b.
COBOL
c.
Visor.Net
d.
JavaScript

Feedback

Question 19

Incorrect
0.00 points out of 1.00
Flag question

Question text

_____ CASE tools provide support for the coding and implementation phases.
Select one:
a.
Back-end
b.
Horizontal
c.
Vertical
d.
Front-end
Incorrect

Feedback

Question 20

Correct
1.00 points out of 1.00
Flag question

Question text

A(n) _____ file provides the composition of the database's logical model and defines the syntax rules for an XML document.
Select one:
a.
XHTML
b.
DTD
Correct
c.
XMLD
d.
meta

Feedback

SQL supports the conditional execution of procedures (IF-THEN-ELSE statements) that are typically supported by a programming language.
CORRECT
A table where all attributes are dependent on the primary key but are independent of each other, and no row contains two or more multivalued facts about an entity is said to be in _____.
CORRECT
The SQL cache stores the end-user written SQL.
CORRECT
See: Ch. 11: Datab
The first step in developing the conceptual model using ER diagrams is to _____.
CORRECT
A derived attribute is indicated in the Chen notation by a _____ that connects the attribute and an entity.
CORRECT
Of the following events, which is defined by ANSI as being equivalent to a COMMIT?
CORRECT
In the context of developing a data administration strategy, a(n) _____ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools.
CORRECT
A relational table must not contain a(n) _____.
CORRECT
_____ fragmentation refers to the division of a relation into attribute subsets.
CORRECT
Relational data warehouses use the star schema design technique to handle multidimensional data.
CORRECT
Disjoint subtypes are subtypes that contain nonunique subsets of the supertype entity set.
CORRECT
You can select partial table contents by naming the desired fields and by placing restrictions on the rows to be included in the output.
CORRECT
Business rules apply to businesses and government groups, but not to other types of organizations such as religious groups or research laboratories.
CORRECT
The Oracle _____ function compares an attribute or expression with a series of values and returns an associated value or a default value if no match is found.
CORRECT
Database design is a(n) _____ process based on repetition.
CORRECT
Which of the following is a reason why a DBMS's daily operations must be clearly documented?
CORRECT
A system table space, a user data table space, an index table space, and a temporary table space are examples of _____.
CORRECT
The transaction processor (TP) is the software component found in each computer that requests data.
CORRECT
A _____ key is defined as a key that is used strictly for data retrieval purposes.
CORRECT
A(n) _____ is an orderly arrangement used to logically access rows in a table.
CORRECT
_____ is a higher-level, object-oriented application interface used to access remote database servers.
CORRECT
Which of the following is a characteristic of the XML metalanguage?
CORRECT
A _____ distributed database system will support different database management systems (DBMS) that may even support different models running under different computer systems.
CORRECT
The _____ must be set large enough to permit as many data requests to be serviced from cache as possible.
CORRECT
See: Ch. 11: Database
A null is created when you press the Enter key or the Tab key to move to the next entry without making a prior entry of any kind.
CORRECT
Relational models view data as part of a table or collection of tables in which all key values must be identified.
CORRECT
In the Systems Development Life Cycle(SDLC), the design of the system's processes begins in the detailed systems design phase.
CORRECT
When using a HDFS, the ______ node creates new files by communicating with the ______ node.
CORRECT
Which of the following refers to the situation where different versions of the same data are stored at different places because they weren't updated consistently?
CORRECT
In the Chen and Crow's Foot notations, an entity is represented with a rectangle containing the entity's name.
CORRECT
In the wait/die scheme, the:
CORRECT
The database structure in a DBMS is stored as a _____.
CORRECT
The main disadvantage of using CGI scripts is that:
CORRECT
Which command would be used to delete the table row where the P_CODE is 'BRT-345'?
CORRECT
The Common Gateway Interface (CGI) is a newer web server interface standard that is much more efficient and faster than a dynamic link library (DLL).
CORRECT
No matter what language you use, if it contains embedded SQL statements, it is called the _____ language.
CORRECT
The _____ data model uses the concept of inheritance.
CORRECT
A(n) ______ is a tag that is used to associate a collection of nodes as being of the same type or belonging to the same group.
CORRECT
Structural dependence exists when it is possible to make changes in the file structure without affecting the application program's ability to access the data.
CORRECT
When performing user access management, a DBA defines each user to the database at the _____ levels.
CORRECT
The "_____" characteristic of a primary key states that the primary key must uniquely identify each entity instance, must be able to guarantee unique values, and must not contain nulls.
CORRECT
_____ tools focus on the strategic and tactical use of information.
CORRECT
The property of _____ enables an entity subtype to inherit the attributes and relationships of the supertype.
CORRECT
A(n) _____ join will select only the rows with matching values in the common attribute(s).
CORRECT
A _____ is a dynamic table that not only contains the SQL query command to generate the rows, but also stores the actual rows.
CORRECT
See: Ch. 13: Business 
A(n) _____ is anything about which data are to be collected and stored.
CORRECT
Relational databases rely on unstructured data.
CORRECT
During the _____ phase of the Systems Development Life Cycle (SDLC), the hardware, database management system (DBMS) software, and application programs are installed, and the database design is implemented.
CORRECT
A field-level lock allows concurrent transactions to access the same row, as long as they require the use of different fields within that row.
CORRECT


























































































































































































































































































 

Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh