ITD 256 Chapter 11 Self Check
F
"T/F Databases are generally the property of a single department within an organization.
Heartbeat Query
A ________ is a query submitted by a DBA to test the current performance of a database or to predict the response time for queries.
biometric device
A ________ measures or detects personal characteristics such as fingerprints.
transaction
A discrete unit of work that must be processed completely or not at all in a computer system is called a(n) ________.
data administration
A high-level function that is responsible for the overall management of data resources in an organization is called ________.
aborted
A transaction that terminates abnormally is called a(n) ________ transaction.
information repository
A(n) ________ is a component that stores metadata.
checkpoint facility
A(n) ________ is a facility by which the DBMS refuses to accept any new transactions.
deadlock
A(n) ________ is an impasse that results when two or more transactions have locked a common resource, and each waits for the other to unlock that resource.
journalizing facility
An audit trail of transactions and database changes is kept by a ________.
Locked
Any data that are retrieved by a user for updating must be ________ until the update is completed or aborted.
authorization rules
Controls incorporated into a data management system that restrict access to data are called ________.
free DBMS source code
Open-source DBMS are ________ software that provides the core functionality of an SQL compliant DBMS.
versioning
Optimistic concurrency control, or ________, restricts each transaction to a view of the database as of the time that the transaction was started.
database implementation
Specifying database access policies is done during the ________ phase.
T
T/F A DBMS may perform checkpoints automatically or in response to commands in user application programs.
T
T/F A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes.
T
T/F A business transaction is a sequence of steps that constitute some well-defined business activity
F
T/F A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager.
F
T/F A deadlock results when two transactions try to read the same record
F
T/F A domain is a way to create a structure that acts like a table.
F
T/F A repository of information about data is called a catalog.
T
T/F A shared lock allows other transactions to read but not update records in use.
T
T/F A typical cause of database destruction is a disk crash.
T
T/F A view can be built to present only the data to which a user requires access.
F
T/F Allocating 10 percent over suggested installation space is sufficient for a DBMS.
T
T/F Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.
F
T/F Backward recovery starts with an earlier copy of the database.
T
T/F CASE tool-generated information should be fed into repositories.
T
T/F Concurrent transactions need to be processed in isolation so that they do not interfere with each other.
F
T/F Database applications are not very disk intensive.
T
T/F Examination and modification of the SQL code in an application may lead to performance improvements.
F
T/F Field-level locks are used quite often.
F
T/F In order to perform a restore/rerun, the database must be mirrored.
F
T/F Loss of data integrity does not impact the quality of data in a database.
F
T/F Open-source software always comes with complete documentation.
F
T/F Specifications for transactions do not need to be reviewed quickly.
F
T/F The Information Resource Lexicon System (IRLS) is a computer software tool used to manage and control access to the information repository.
T
T/F The data administrator takes responsibility for the overall management of data resources.
T
T/F The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme.
T
T/F The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
F
T/F The granularity of locking is not a critical decision in database design.
T
T/F The repository information model defines types, which should be easy to extend.
T
T/F The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.
T
T/F The role of database administration is typically a more hands-on, physical involvement with the management of databases.
F
T/F The transaction log contains before- and after-images of records that have been modified.
F
T/F There are two principal types of authorization tables: one for subjects and one for facts.
F
T/F Three-factor authentication is most often implemented with a credit card.
T
T/F Two-phase locking results in a growing phase where locks are acquired and a shrinking phase where locks are released.
F
T/F Versioning takes the pessimistic approach to locking.
T
T/F With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.
T
T/F installation of the DBMS product is essential to any environment.
recovery manager
The ________ allows the DBMS to restore the database to a condition and restart processing transactions.
Exact Match transaction log
The ________ is a record of the essential data for each transaction that has been processed against the database.
inconsistent read problem
The ________ occurs when one user reads data that have been partially updated by another user.
restore/rerun
The ________ technique involves reprocessing the day's transactions against the backup copy of the database.
encryption
The coding or scrambling of data so that humans cannot read them is called ________.
transaction boundary
The logical beginning and end of a transaction is called a ________.
growing, shrinking
The phases of the two-phase locking protocol are referred to as the ________ phase and the ________ phase.
concurrency control
The process of managing simultaneous operations against a database so that data integrity is maintained is called ________.
data warehouse administrator
The role of a ________ emphasizes integration and coordination of metadata across many data sources.
Shared
________ locks allow other transactions to read but not update a record or other resource.
Dynamic extensibility
________ makes it easier to integrate a new software tool into a development process.