Ch8 final
Open-source software always comes with complete documentation. T/F
F
A DBMS may perform checkpoints automatically or in response to commands in user application programs. T/F
T
A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes. T/F
T
A shared lock allows other transactions to read but not update records in use. T/F
T
A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day. T/F
T
A typical cause of database destruction is a disk crash. T/F
T
The data administrator takes responsibility for the overall management of data resources. T/F
T
The repository information model defines types, which should be easy to extend. T/F
T
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a: checkpoint facility. database change log. backup facility. recovery manager.
a
An advantage of partitioning is: remote optimization. efficiency. increase redundancy. extra space and update time.
b
A file organization is a named portion of primary memory. T/F
F
Versioning takes the pessimistic approach to locking. T/F
F
A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager. T/F
F
A deadlock results when two transactions try to read the same record. T/F
F
A default value is the value that a field will always assume, regardless of what the user enters for an instance of that field. T/F
F
A domain is a way to create a structure that acts like a table. T/F
F
A repository of information about data is called a catalog. T/F
F
Allocating 10 percent over suggested installation space is sufficient for a DBMS. T/F
F
Backward recovery starts with an earlier copy of the database. T/F
F
Controls incorporated into a data management system that restrict access to data are called authentication rules. T/F
F
Denormalization is the process of transforming relations with variable-length fields into those with fixed-length fields. T/F
F
Field-level locks are used quite often. T/F
F
Free range partitioning is a type of horizontal partitioning in which each partition is defined by a range of values for one or more columns in the normalized table. T/F
F
Horizontal partitioning refers to the process of combining several smaller relations into a larger table. T/F
F
In order to perform a restore/rerun, the database must be mirrored. T/F
F
Loss of data integrity does not impact the quality of data in a database. T/F
F
One method to handle missing values is to substitute an exact value. T/F
F
The Information Resource Lexicon System (IRLS) is a computer software tool used to manage and control access to the information repository. T/F
F
The granularity of locking is not a critical decision in database design. T/F
F
The transaction log contains before- and after-images of records that have been modified. T/F
F
There are two principal types of authorization tables: one for subjects and one for facts. T/F
F
A view can be built to present only the data to which a user requires access. T/F
T
Along with table scans, other elements of a query can be processed in parallel. T/F
T
An audit trail of transactions and database changes is kept by a journalizing facility. T/F
T
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data. T/F
T
CASE tool-generated information should be fed into repositories. T/F
T
Concurrent transactions need to be processed in isolation so that they do not interfere with each other. T/F
T
Correct installation of the DBMS product is essential to any environment. T/F
T
Denormalization almost always leads to more storage space for raw data. T/F
T
Examination and modification of the SQL code in an application may lead to performance improvements. T/F
T
In a Heap file organization, files are not stored in any particular order. T/F
T
In a sequential file, the records are stored in sequence according to a primary key value. T/F
T
Live migration from one environment to another in cloud computing is a challenge. T/F
T
One decision in the physical design process is selecting structures. T/F
T
One objective of selecting a data type is to minimize storage space. T/F
T
Security is one advantage of partitioning. T/F
T
Sensitivity testing involves ignoring missing data unless knowing a value might significantly change results. T/F
T
The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme. T/F
T
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access. T/F
T
Two-phase locking results in a growing phase where locks are acquired and a shrinking phase where locks are released. T/F
T
VarChar2 would be appropriate for a user that wanted a text datatype for LastName that would only consume the required space. T/F
T
With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data. T/F
T
A ________ is a query submitted by a DBA to test the current performance of a database or to predict the response time for queries. Hearbeat query optimize query satisfaction query
a
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process and output electronic data in a secure manner is called a(n): smart card. smart chip. e-credit card. secure card.
a
A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called: parallel query processing. perpendicular query processing. multiple partition queries. query optimization.
a
A(n) ________ is a component that stores metadata. information repository index data terms
a
All of the following are valid datatypes in Oracle 12c EXCEPT: BOOLEAN. VARCHAR2. BLOB. NUMBER.
a
Controls incorporated into a data management system that restrict access to data are called ________. authorization rules permissions status
a
Distributing the rows of data into separate files is called: horizontal partitioning. file allocation. vertical partitioning. normalization.
a
The ________ occurs when one user reads data that have been partially updated by another user. inconsisten read problem
a
The ________ technique involves reprocessing the day's transactions against the backup copy of the database. restore/rerun
a
Which of the following functions develop integrity controls? database design database control database implementation
a
Which of the following functions model business rules? database analysis database design database control
a
Which of the following is an objective of selecting a data type? Improve data integrity Maximize storage space Limit security Represent a small number of possible values
a
While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the: operating system. user. XML. CEO.
a
A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called: Platform-as-a-service. Software-as-a-service. Soft-computing-service. Infrastructure-as-a-service.
b
A detailed coding scheme recognized by system software for representing organizational data is called a(n): DBMS code. data type. SQL. DB layout.
b
A form of denormalization where the same data are purposely stored in multiple places in the database is called: advanced placement. data replication. data duplication. horizontal partitioning.
b
A method for handling missing data is to: delete the associated row. track missing data with special reports. perform insensitivity testing. substitute with random numbers for the missing data.
b
All of the following are common denormalization opportunities EXCEPT: reference data. a one-to-many relationship. two entities with a one-to-one relationship. a many-to-many relationship with nonkey attributes.
b
One field or combination of fields for which more than one record may have the same combination of values is called a(n): composite key. secondary key. index. linked key.
b
The logical beginning and end of a transaction is called a ________. transaction completeness transaction boundary transaction defect
b
The smallest unit of application data recognized by system software is a: data type. field. column. row.
b
When incorrect data have been introduced, the database is best recovered by: starting with a new ERD. restarting from the most recent checkpoint and processing subsequent transactions. reloading RDMS software. formatting server.
b
Which type of file is most efficient with storage space? Clustered Sequential Indexed Hashed
b
________ locks allow other transactions to read but not update a record or other resource. private shared public
b
A disadvantage of partitioning is: remote optimization. simplicity. extra space and update time. shorter technology spans.
c
A discrete unit of work that must be processed completely or not at all within a computer system is called a Journalizing facility. change control device. transaction. before image.
c
A factor to consider when choosing a file organization is: DDL. DML. efficient storage. inefficient data retrieval.
c
A key decision in the physical design process is: deciding on the monitor. deciding the e-r diagrams. selecting structures. ignoring the size of the database.
c
A requirement to begin designing physical files and databases is: implementation complete. all datatypes determined normalized relations. physical tables created.
c
A trigger can be used as a security measure in which of the following ways? To conduct a DFD analysis To check for viruses To cause special handling procedures to be executed To design a database
c
All of the following are advantages to cloud-based computing EXCEPT: no need for initial investment in hardware, physical facilities and systems software. elasticity. ACID support for database as a service. organizations can explore new data management technologies more easily.
c
An integrity control supported by a DBMS is: GUI guards. security. range control. substitute estimates.
c
Controls designed to restrict access and activities are called: schemas. business rules. authorization rules. encryption controls.
c
The coding or scrambling of data so that humans cannot read them is called ________. hiding. encoding. encryption. demarcation.
c
The process of managing simultaneous operations against a database so that data integrity is maintained is called ________. Seperate control duplicate control concurrency control
c
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. data integration programmer productivity data integrity query design
c
________ is used to undo unwanted database changes. Rollforward Encryption Rollback Restart
c
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs. transaction logger backup facility restart facility recovery manager
d
A cloud computing approach in which the service consists mainly of hardware and systems software resources is called: Software-as-a-service. Platform-as-a-service. IDE. Infrastructure-as-a-service.
d
A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called: Tools-as-a-service. Software-as-a-service. Infrastructure-as-a-service. Platform-as-a-service.
d
A method to allow adjacent secondary memory space to contain rows from several tables is called: compiling. cluttering. concatenating. clustering.
d
A transaction that terminates abnormally is called a(n) ________ transaction. terminated completed deleted aborted
d
All of the following are objectives when selecting a data type EXCEPT: improve data integrity. represent all possible values. support all data manipulations. use a lot of storage space.
d
In which type of file is multiple key retrieval not possible? Clustered Sequential Indexed Hashed
d