Database Management Chapter 8

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may be locked and are exclusive locks the only ones permitted?

concurrent update

____ locks forbid any other user from accessing the data in any way.

exclusive

Management approval is not required before the security policies and procedures can be implemented.

false

Programmers monitor database usage to detect potential security violations.

false

SQL is an example of a procedural language.

false

When a company decides to purchase a new DBMS, the CEO leads the DBMS evaluation and selection effort.

false

(HIPAA)

is a federal law that specifies the rules for storing, handling, and protecting health-care transactions.

The ____ is responsible for providing training in the use of the DBMS.

DBA

____ integrity is the constraint that says that the values in foreign keys must match values already in the database.

Referential

A shared lock permits other users to read the data in the database.

true

Damage to a database can occur through a physical incident such as a computer malfunction.

true

QBE is an example of a nonprocedural language.

true

The DBA is responsible for DBMS maintenance, data dictionary management, and training.

true

Changing the database design to improve the performance is called ____ the design.

tuning

Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time?

Limitations

production system, or live system

The hardware, software, and database for the users

tuning

change the database design to improve performance;

A ____ is a place where a record of certain corporate data is kept.

data archive

Context-sensitive help

means that if a user is having trouble and asks for help, the DBMS will provide assistance for the particular feature being used at the time the user asks for the help.

shared lock

permits other users to read the data; with an exclusive lock, no other user may access the data in any way.

After the database designers complete the information-level design, the DBA does the ____-level design.

physical

By default, Access and other DBMSs create indexes automatically for the ____ keys.

primary and foreign

Department of Defense (DOD) 5015.2 Standard

provides data management requirements for the DOD and for companies supplying or dealing with the DOD.

Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas?

replication and disturbed databases

disaster recovery plan

specifies the ongoing and emergency actions and procedures required to ensure data availability if a disaster occurs.

to implement and enforce security DBA uses such features as journalism and metadata.

False

After the DBMS is purchased, the ____ has primary responsibility for installation and maintenance.

DBA

The ____ determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog to ensure that users access the database only in ways in which they are entitled to do so.

DBA

The ____ establishes the naming conventions for tables, fields, and indexes in the data dictionary.

DBA

Which of the following DBMS evaluation categories does the following question relate to: Is it a simple catalog or can it contain more content, such as information about programs and the various data items these programs access?

Data dictonary

Which of the following DBMS evaluation categories does the following question relate to: Does the vendor of the DBMS supply printed or online training manuals and how good are the manuals?

Documentation and Training

Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export?

Potability

An internal company network that uses software tools typically used on the Internet and World Wide Web is called a virtual network.

False

Another term for production system is the sandbox.

False

Any changes made in the database structure are communicated only to the affected users.

False

In order to develop new programs, the programmers need access to the information in the DBMS. They are given access to the ____.

Test System

If a DBMS lacks essential security features, the DBA might create or purchase special security programs that provide the missing features.

True

The DBA determines and documents the database access privileges for all users.

True

To protect an organization's data against physical damage, the DBA creates and implements backup and recovery procedures as part of a disaster recovery plan.

True

The Sarbanes-Oxley (SOX) Act of 2002

a federal law that specifies data retention and verification requirements for public companies, requires CEOs and CFOs to certify financial statements and makes it a crime to destroy or tamper with financial records.

data archive or archive

a place where a record of certain corporate data is kept.

uninterruptible power supply (UPS)

a power source such as a battery or fuel cell, for short interruptions and a power generator for longer outages.

Denormalizing

converts a table that is in third normal form to a table that is no longer in third normal form.

redundant array of inexpensive/independent drives (RAID)

database updates are replicated to multiple hard drives so that an organization can continue to process database updates after losing one of its hard drives

____ converts a table that is in third normal form to a table no longer in third normal form.

denormalization

hot site

is a backup site that an organization can switch to in minutes or hours because the site is completely equipped with duplicate hardware, software, and data.

warm site

is a backup site that is equipped with duplicate hardware and software but not data, so it takes longer to start processing at a warm site compared to a hot site.

local area network [LAN]

is a configuration of several computers connected together that allows users to share a variety of hardware and software resources.

Presidential Records Act

is a federal law that regulates the data retention requirements for all communications, including electronic communications, of U.S. presidents and vice presidents.

Patriot Act of 2001

is a federal law that specifies data retention requirements for the identification of customers opening accounts at financial institutions, allows law enforcement agencies to search companies' and individuals' records and communications, and expands the government's authority to regulate financial transactions.

intranet

is an internal company network that uses software tools typically used on the Internet and the World Wide Web.

DBA

is the person who is responsible for supervising the database and the use of the DBMS.

Which of the following DBMS evaluation categories does the following question relate to: On what operating system and hardware is the DBMS supported?

limitations

Tables with indexes allow faster searches, but slower performance on ____.

updates

test system, or sandbox

use to develop new programs and modify existing programs.


Conjuntos de estudio relacionados

BUS 12: CH 15: Interactive Presentations

View Set

DECA Marketing Cluster Practice Exam

View Set

Contemporary Europe Political Map Qs "Political Map Hunt Clues"

View Set