AIST-3410 After Midterm

¡Supera tus tareas y exámenes ahora con Quizwiz!

An appropriate datatype for adding a sound clip would be:

BLOB.

All of the following are valid datatypes in Oracle 12c EXCEPT:

BOOLEAN

An extent is a named portion of secondary memory allocated for the purpose of storing physical records.

FALSE

Free range partitioning is a type of horizontal partitioning in which each partition is defined by a range of values for one or more columns in the normalized table.wws

FALSE

Horizontal partitioning is very different from creating a supertype/subtype relationship.

FALSE

Horizontal partitioning refers to the process of combining several smaller relations into a larger table.

FALSE

In order to perform a restore/rerun, the database must be mirrored.

FALSE

Which of the following threats involves outside parties using information to embarrass a company?

Loss of confidentiality

In which data model would a code table appear?

Physical

A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called:

Platform-as-a-service

Which type of file is most efficient with storage space?

Sequential

A DBMS may perform checkpoints automatically or in response to commands in user application programs.

TRUE

A hashing algorithm is a routine that converts a primary key value into a relative record address.

TRUE

A pointer is a field of data that can be used to locate a related field or record of data.

TRUE

A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.

TRUE

A view can be built to present only the data to which a user requires access.

TRUE

Along with table scans, other elements of a query can be processed in parallel.

TRUE

Controls incorporated into a data management system that restrict access to data are called authentication rules.

TRUE

Efficient database structures will be beneficial only if queries and the underlying database management system are tuned to properly use the structures.

TRUE

Hash partitioning spreads data evenly across partitions independent of any partition key value.

TRUE

In a sequential file, the records are stored in sequence according to a primary key value.

TRUE

Indexes are most useful for columns that frequently appear in WHERE clauses of SQL commands, either to qualify the rows to select or for linking.

TRUE

Live migration from one environment to another in cloud computing is a challenge

TRUE

One decision in the physical design process is selecting structures.

TRUE

One objective of selecting a data type is to minimize storage space.

TRUE

Platform-as-a-service is an approach for providing infrastructure resources and tools for developers to be productive.

TRUE

Requirements for response time, data security, backup, and recovery are all requirements for physical design.

TRUE

The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme.

TRUE

________ partitioning distributes the columns of a table into several separate physical records.

Vertical

The preferred method of fixing an aborted transaction is:

backing out the transaction.

A device to measure or detect fingerprints or signatures is called a(n) ________ device.

biometric

A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:

checkpoint facility.

The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space.

data integrity

The value a field will assume unless the user enters an explicit value for an instance of that field is called a:

default value.

The coding or scrambling of data so that humans cannot read them is called:

encryption.

A contiguous section of disk storage space is called a(n):

extent.

A disadvantage of partitioning is:

extra space and update time.

The smallest unit of application data recognized by system software is a:

field.

A file organization where files are not stored in any particular order is considered a:

heap file organization.

An audit trail of database changes is kept by a:

journalizing facility

A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called:

parallel query processing.

A(n) ________ is a field of data used to locate a related field or record.

pointer

An integrity control supported by a DBMS is:

range control.

A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.

recovery manager

One field or combination of fields for which more than one record may have the same combination of values is called a(n):

secondary key.

Guidelines for server security should include all of the following EXCEPT:

securing the network between client and server.

A key decision in the physical design process is:

selecting structures.

All of the following are disadvantages to cloud-based computing EXCEPT:

the visibility of costs of data management is better

A method for handling missing data is to:

track missing data with special reports

Database access frequencies are estimated from:

transaction volumes.

A discrete unit of work that must be processed completely or not at all within a computer system is called a:

transaction.

Forward recovery is faster than restore/rerun because:

transactions do not have to be repeated.

All of the following are characteristics of cloud technologies EXCEPT:

unlimited bandwidth.

Parallel query processing speed is not significantly different from running queries in a non-parallel mode.

FALSE

The record log is a record of the essential data for each transaction that has been processed against the database.

FALSE

The restoration manager allows the DBMS to restore the database to a correct condition and restart processing transactions.

FALSE

A transaction that terminates abnormally is called a(n) ________ transaction.

aborted

While views promote security by restricting user access to data, they are not adequate security measures because:

an unauthorized person may gain access to a view through experimentation.

When incorrect data have been introduced, the database is best recovered by:

restarting from the most recent checkpoint and processing subsequent transactions.


Conjuntos de estudio relacionados

Chapter 07: Health Promotion of the Newborn and Family

View Set

Adult Health Final Exam Questions

View Set

Taxation of Life Insurance and Annuity Quizzes

View Set

AP Bio chapters 14 and 15 review questions

View Set

Entrepreneurship - Chapters 7 & 8

View Set

3 - Life Insurance Policies - Provisions, Options and Riders (Exam 1)

View Set

PSY 350 midterm 1 + 2, PSY 350 new material for final

View Set

care across the Lifespan Prep U Final exam

View Set

Chapter 16 Practice Quiz Questions

View Set

2.7 Personal Uses of Life Insurance

View Set

Exercise 15: Histology of Nervous Tissue

View Set