Chapter 8
Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export? a. Cost b. Future plans c. Portability d. Performance
c. Portability
What can organizations use in their computer systems that allow the system to continue to process database transactions after a hard drive failure? a. UPS b. backup c. RAID d. surge suppressor
c. RAID
If performance testing shows that queries based on frequently accessed fields are taking a long time to complete, what can the DBA do that might improve performance? a. increase the number of columns b. delete foreign keys c. add indexes d. add alternate keys
c. add indexes
If users access only certain fields in a table, how can you improve performance? a. by splitting the table into two or more tables and removing the primary key b. by combining the table with another table that performs better c. by splitting the table into two or more tables that each has the same primary key as the original d. by adding indexes to each column and deleting the primary and alternate keys
c. by splitting the table into two or more tables that each has the same primary key as the original
Which DBA role organizes metadata, and acts as a liaison between the database administrator and the rest of the database staff? a. data architect b. database programmer c. data administrator d. data operations manager
c. data administrator
What is it called when a database is divided into segments and the segments are stored on different computers? a. converged database b. centralized database c. distributed database d. virtual database
c. distributed database
In a LAN, support for ____________________ update is very important because many users might be updating the database at the same time.
concurrent
Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time? a. Concurrent update b. Security c. Integrity d. Limitations
d. Limitations
When evaluating and selecting a DBMS, in which category is the DBA most concerned with benchmarks? a. Cost b. Security c. Integrity d. Performance
d. Performance
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas? a. Backup and recovery b. Security c. Integrity d. Replication and distributed databases
d. Replication and distributed databases
Which DBA role makes sure the data gets from one place to another with integrity and security? a. data architect b. database programmer c. data administrator d. data operations manager
d. data operations manager
Which group performs additional testing of the database program after the programmers complete their testing? a. customers b. accounting c. users d. quality assurance
d. quality assurance
What is it called when a 2-step identity verification procedure is used to grant users access to the system? a. smart card authorization b. multilayer security c. security in depth d. two-factor authentication
d. two-factor authentication
The data ____________________ is the catalog, but it often contains a wider range of information, including information about tables, fields, indexes, programs, and users.
dictionary
The ____________________ recovery plan specifies the ongoing and emergency actions and procedures required to ensure data availability if a disaster occurs.
disaster
When the primary key cannot be null, this is known as ____________________.
entity integrity
All database users need full access to all tables and fields in the database.
false
If a user is granted the use of the SELECT statement on a table, the user is also authorized to use UPDATE statements even if the user was not specifically granted that permission.
false
Programmers monitor database usage to detect potential security violations.
false
QBE is an example of a procedural language.
false
The ability of a DBMS to allow multiple computers to share access to data and software by running multiple instances of a single, shared database is called a serial database system.
false
The command 'REVOKE REFERENCES ON Customer to bsmith' prevents the bsmith user from using the ALTER TABLE statement to change a table definition.
false
The data architect sets data-handling policies and assigns data entry.
false
When selecting a DBMS, the only database model choice available to the DBA is the relational model.
false
A(n) ____________________ site is a backup site that an organization can switch to in minutes or hours because the site is completely equipped with duplicate hardware, software, and data.
hot
An ____________________ is an internal company network that uses software tools typically used on the Internet and the World Wide Web.
intranet
The database ____________________ manager is concerned with the ongoing maintenance of established databases.
operations
Database ____________________ deals with the ability of the production system to serve users in a timely and responsive manner.
performance
DBAs should have an understanding of information legislation such as the Data ____________________ Act.
protection
A shared lock permits other users to read the data in the database.
true
The DBA determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog.
true
The DBA is responsible for DBMS maintenance, data dictionary management, and training.
true
The data architect designs, builds, and deploys databases.
true
To manage problems that arise from using a DBMS, companies appoint a DBA to manage both the database and the use of the DBMS.
true
When selecting a DBMS and evaluating the concurrent update category, you should determine whether the DBMS resolves deadlock.
true
When selecting a DBMS and evaluating the data definitions category, you should ask if the DBMS supports views.
true
A(n) ____________________ site is a backup site that is equipped with duplicate hardware and software but not data
warm
What type of locks forbid any other user from accessing the data in any way? a. Shared b. Exclusive c. Limited d. Concurrent
b. Exclusive
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS support encryption, password support, and authorization rules? a. Concurrent update b. Security c. Integrity d. Limitations
b. Security
Which process converts a table that is in third normal form to a table no longer in third normal form? a. conversion b. denormalizing c. normalization d. replication
b. denormalizing
Which of the following is a log of all database maintenance, with dates, license keys, issues or updates, involved personnel, and resolutions? a. system journal b. run-book c. system catalog d. DBMS log
b. run-book
What type of environment do database programmers use to develop new programs and modify existing programs? a. live b. sandbox c. production d. virtual
b. sandbox
Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may be locked and are exclusive locks the only ones permitted? a. Concurrent update b. Data recovery c. Data dictionary d. Security
a. Concurrent update
Which DBA role manages or supervises the construction of large and comprehensive databases? a. data architect b. database programmer c. data administrator d. data operations manager
a. data architect
After the database designers complete the information-level design, what design level does the DBA do next? a. physical b. information c. logical d. graphical
a. physical