Modern Database Management - Self Check 11

¡Supera tus tareas y exámenes ahora con Quizwiz!

Allocating 10 percent over suggested installation space is sufficient for a DBMS.

Balse

Specifying database access policies is done during the ________ phase.

Database implementation

________ makes it easier to integrate a new software tool into a development process.

Dynamic extensibility

A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager.

False

A deadlock results when two transactions try to read the same record.

False

A domain is a way to create a structure that acts like a table.

False

A repository of information about data is called a catalog.

False

Backward recovery starts with an earlier copy of the database.

False

Database applications are not very disk intensive.

False

Databases are generally the property of a single department within an organization.

False

Field-level locks are used quite often.

False

In order to perform a restore/rerun, the database must be mirrored.

False

Loss of data integrity does not impact the quality of data in a database.

False

Open-source software always comes with complete documentation.

False

Specifications for transactions do not need to be reviewed quickly.

False

The Information Resource Lexicon System (IRLS) is a computer software tool used to manage and control access to the information repository.

False

The granularity of locking is not a critical decision in database design.

False

The transaction log contains before- and after-images of records that have been modified.

False

There are two principal types of authorization tables: one for subjects and one for facts.

False

Three-factor authentication is most often implemented with a credit card.

False

Versioning takes the pessimistic approach to locking.

False

________ locks allow other transactions to read but not update a record or other resource.

Shared

A DBMS may perform checkpoints automatically or in response to commands in user application programs.

True

A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes.

True

A business transaction is a sequence of steps that constitute some well-defined business activity.

True

A shared lock allows other transactions to read but not update records in use.

True

A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.

True

A typical cause of database destruction is a disk crash.

True

A view can be built to present only the data to which a user requires access.

True

Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.

True

CASE tool-generated information should be fed into repositories.

True

Concurrent transactions need to be processed in isolation so that they do not interfere with each other.

True

Correct installation of the DBMS product is essential to any environment.

True

Examination and modification of the SQL code in an application may lead to performance improvements.

True

The data administrator takes responsibility for the overall management of data resources.

True

The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme.

True

The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.

True

The repository information model defines types, which should be easy to extend.

True

The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.

True

The role of database administration is typically a more hands-on, physical involvement with the management of databases.

True

Two-phase locking results in a growing phase where locks are acquired and a shrinking phase where locks are released.

True

With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.

True

A transaction that terminates abnormally is called a(n) ________ transaction.

aborted

Controls incorporated into a data management system that restrict access to data are called ________.

authorization rules

A ________ measures or detects personal characteristics such as fingerprints

biometric device

A(n) ________ is a facility by which the DBMS refuses to accept any new transactions.

checkpoint facility

The process of managing simultaneous operations against a database so that data integrity is maintained is called ________.

concurrency control

A high-level function that is responsible for the overall management of data resources in an organization is called ________.

data administration

The role of a ________ emphasizes integration and coordination of metadata across many data sources.

data wharehouse administrator

A(n) ________ is an impasse that results when two or more transactions have locked a common resource, and each waits for the other to unlock that resource.

deadlock

The coding or scrambling of data so that humans cannot read them is called ________.

encryption

Open-source DBMS are ________ software that provides the core functionality of an SQL compliant DBMS.

free

The phases of the two-phase locking protocol are referred to as the ________ phase and the ________ phase.

growing, shrinking

A ________ is a query submitted by a DBA to test the current performance of a database or to predict the response time for queries

heartbeat query

The ________ occurs when one user reads data that have been partially updated by another user.

inconsisten read problem

A(n) ________ is a component that stores metadata.

information repository

An audit trail of transactions and database changes is kept by a ________.

jounalizing facility

Any data that are retrieved by a user for updating must be ________ until the update is completed or aborted.

locked

The ________ allows the DBMS to restore the database to a correct condition and restart processing transactions.

recovery manager

The ________ technique involves reprocessing the day's transactions against the backup copy of the database.

restore/rerun

A discrete unit of work that must be processed completely or not at all in a computer system is called a(n) ________.

transaction

The logical beginning and end of a transaction is called a ________.

transaction boundary

The ________ is a record of the essential data for each transaction that has been processed against the database.

transaction log

Optimistic concurrency control, or ________, restricts each transaction to a view of the database as of the time that the transaction was started.

versioning


Conjuntos de estudio relacionados

PS 160 Unit 2: Sound and Hearing, Temperature and Heat, and Thermal Properties of Matter

View Set

Consumer Behavior Final Chapter 14

View Set

mastering microbiology chapter 9

View Set

Chapter 3 Expressions and Interactivity

View Set

Towards a New Worldview Chapter 16

View Set

Texas Real Estate Finance - Chp. 1 - The Nature and Cycle of Real Estate Finance

View Set