Ch 8 for mergin

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager. T/F

F

A default value is the value that a field will always assume, regardless of what the user enters for an instance of that field. T/F

F

A domain is a way to create a structure that acts like a table. T/F

F

A file organization is a named portion of primary memory. T/F

F

A join index is a combination of two or more indexes. T/F

F

ACID support for database-as-a-service is easily provided in a cloud computing environment. T/F

F

An extent is a named portion of secondary memory allocated for the purpose of storing physical records. T/F

F

Backward recovery starts with an earlier copy of the database. T/F

F

Controls incorporated into a data management system that restrict access to data are called authentication rules. T/F

F

Denormalization is the process of transforming relations with variable-length fields into those with fixed-length fields. T/F

F

Free range partitioning is a type of horizontal partitioning in which each partition is defined by a range of values for one or more columns in the normalized table. T/F

F

Horizontal partitioning refers to the process of combining several smaller relations into a larger table. T/F

F

In order to perform a restore/rerun, the database must be mirrored. T/F

F

Loss of data integrity does not impact the quality of data in a database. T/F

F

One method to handle missing values is to substitute an exact value. T/F

F

Parallel query processing speed is not significantly different from running queries in a non-parallel mode. T/F

F

Reduced uptime is a disadvantage of partitioning. T/F

F

The Number datatype would be appropriate for a zip code. T/F

F

The logical database design always forms the best foundation for grouping attributes in the physical design. T/F

F

The restoration manager allows the DBMS to restore the database to a correct condition and restart processing transactions. T/F

F

Three-factor authentication is most often implemented with a credit card. T/F

F

Unlimited bandwidth is a characteristic of cloud computing. T/F

F

Using an index for attributes referenced in ORDER BY and GROUP BY clauses has no significant impact upon database performance. T/F

F

A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes. T/F

T

A checkpoint facility is a facility by which the DBMS refuses to accept any new transactions. T/F

T

A hashing algorithm is a routine that converts a primary key value into a relative record address. T/F

T

A key component of the Sarbanes-Oxley Act was enacted to ensure the integrity of IT infrastructure in use within an organization. T/F

T

A pointer is a field of data that can be used to locate a related field or record of data. T/F

T

A tablespace is a named set of disk storage elements in which physical files for the database tables may be stored. T/F

T

A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day. T/F

T

A view can be built to present only the data to which a user requires access. T/F

T

Along with table scans, other elements of a query can be processed in parallel. T/F

T

An audit trail of transactions and database changes is kept by a journalizing facility T/F

T

Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data. T/F

T

Denormalization almost always leads to more storage space for raw data. T/F

T

Examination and modification of the SQL code in an application may lead to performance improvements. T/F

T

Fast data retrieval is one factor to consider when choosing a file organization for a particular database file. T/F

T

Hash partitioning spreads data evenly across partitions independent of any partition key value. T/F

T

In a Heap file organization, files are not stored in any particular order. T/F

T

Keeping the zip code with the city and state in a table is a typical form of denormalization. t/f

T

Live migration from one environment to another in cloud computing is a challenge. T/F

T

One objective of selecting a data type is to minimize storage space. T/F

T

Platform-as-a-service is an approach for providing infrastructure resources and tools for developers to be productive. T/F

T

Security is one advantage of partitioning. T/F

T

Sensitivity testing involves ignoring missing data unless knowing a value might significantly change results. T/F

T

The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme. T/F

T

The goal of database security is the protection of data from accidental or intentional threats to its integrity and access. T/F

T

The restore/rerun technique involves reprocessing the day's transactions against the backup copy of the database. T/F

T

VarChar2 would be appropriate for a user that wanted a text datatype for LastName that would only consume the required space. T/F

T

With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data. T/F

T

n a sequential file, the records are stored in sequence according to a primary key value. T/F

T

Correct installation of the DBMS product is essential to any environment.

True

A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a: checkpoint facility. database change log. backup facility. recovery manager.

a

A cloud computing approach in which the service consists mainly of hardware and systems software resources is called: Infrastructure-as-a-service. IDE. Software-as-a-service. Platform-as-a-service

a

A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a: hash index table. hash key. multi-indexed file organization. hashed file organization.

a

A key decision in the physical design process is: selecting structures. deciding on the monitor. deciding the e-r diagrams. ignoring the size of the database.

a

All of the following are advantages to cloud-based computing EXCEPT: ACID support for database as a service. elasticity. organizations can explore new data management technologies more easily no need for initial investment in hardware, physical facilities and systems software.

a

All of the following are disadvantages to cloud-based computing EXCEPT: the visibility of costs of data management is better. DBaaS is still struggling to provide ACID properties of databases. live migration from one environment to another is a challenge. the promise of elasticity is not fulfilled because the model will not adapt to changing requirements.

a

All of the following are valid datatypes in Oracle 12c EXCEPT: BOOLEAN. BLOB. VARCHAR2. NUMBER.

a

An audit trail of transactions and database changes is kept by a ________. journalizing facility. before image. change control device. subschema

a

Designing physical files requires ________ of where and when data are used in various ways. descriptions maps keys hints

a

Distributing the rows of data into separate files is called: horizontal partitioning. file allocation. vertical partitioning. normalization

a

One field or combination of fields for which more than one record may have the same combination of values is called a(n): secondary key linked key composite key index

a

Sarbanes-Oxley Act was enacted to ensure the integrity of: public companies' financial statements. SQL. Entity-Relationship Diagrams. private companies' shareholders meetings.

a

The smallest unit of application data recognized by system software is a: field. column. data type. row

a

Which of the following is an objective of selecting a data type? Improve data integrity Maximize storage space Limit security Represent a small number of possible values

a

Which of the following is an objective of selecting a data type? Improve data integrity Limit security Represent a small number of possible values Maximize storage space

a

While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the: operating system. XML. user. CEO.

a

A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called: Platform-as-a-service. Software-as-a-service. Soft-computing-service. Infrastructure-as-a-service.

b

A detailed coding scheme recognized by system software for representing organizational data is called a(n): DBMS code. data type. SQL. DB layout.

b

A device to measure or detect fingerprints or signatures is called a(n) ________ device. ink biometric laser view

b

A disadvantage of partitioning is: remote optimization. extra space and update time. shorter technology spans. simplicity.

b

A discrete unit of work that must be processed completely or not at all in a computer system is called a(n) ________. journalizing facility. transaction. change control device. before image.

b

A factor to consider when choosing a file organization is: DDL. efficient storage. inefficient data retrieval. DML.

b

A file organization where files are not stored in any particular order is considered a: hash key. heap file organization. multi-indexed file organization. hashed file organization.

b

A method for handling missing data is to: delete the associated row. track missing data with special reports. perform insensitivity testing. substitute with random numbers for the missing data.

b

A(n) ________ is a field of data used to locate a related field or record. lock pointer index key

b

All of the following are common denormalization opportunities EXCEPT: reference data. a one-to-many relationship. two entities with a one-to-one relationship. a many-to-many relationship with nonkey attributes.

b

In which type of file is multiple key retrieval not possible? Indexed Hashed Clustered Sequential

b

When incorrect data have been introduced, the database is best recovered by: starting with a new ERD. restarting from the most recent checkpoint and processing subsequent transactions. reloading RDMS software. formatting server.

b

Which type of file is easiest to update? Clustered Hashed Sequential Indexed

b

________ partitioning distributes the columns of a table into several separate physical records. Horizontal Vertical Crossways Final

b

A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers, and join tables to prepare query results is the: explain query. show optimization. explain plan. analyze query.

c

A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called: query optimization. perpendicular query processing. parallel query processing. multiple partition queries

c

A trigger can be used as a security measure in which of the following ways? To conduct a DFD analysis To check for viruses To cause special handling procedures to be executed To design a database

c

An appropriate datatype for adding a sound clip would be: CHAR. DATE. BLOB. VARCHAR

c

An index on columns from two or more tables that come from the same domain of values is called a: bitmap index. transaction index. join index. multivalued index

c

An integrity control supported by a DBMS is: GUI guards. security. range control. substitute estimates.

c

Arequirement to begin designing physical files and databases is: implementation complete. all datatypes determined. normalized relations. physical tables created.

c

Controls designed to restrict access and activities are called: business rules. schemas. authorization rules. encryption controls.

c

Forward recovery is faster than restore/rerun because: images are mirrored. security can be avoided. transactions do not have to be repeated. systems are more complete.

c

The coding or scrambling of data so that humans cannot read them is called ________. hiding. encoding. encryption. demarcation.

c

The preferred method of fixing an aborted transaction is: repairing the schema. switching. backing out the transaction. duplication of data.

c

Which type of file is most efficient with storage space? Indexed Hashed Sequential Clustered

c

A ________ is a DBMS module that restores the database to a correct condition when a failure occurs. restart facility backup facility transaction logger recovery manager

d

A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called: Tools-as-a-service. Software-as-a-service. Infrastructure-as-a-service. Platform-as-a-service.

d

A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process, and output electronic data in a secure manner is called a(n): smart chip. secure card. e-credit card. smart card

d

A form of denormalization where the same data are purposely stored in multiple places in the database is called: horizontal partitioning. advanced placement. data duplication. data replication.

d

A method to allow adjacent secondary memory space to contain rows from several tables is called: compiling. cluttering. concatenating. clustering.

d

A transaction that terminates abnormally is called a(n) ________ transaction. terminated deleted completed aborted

d

All of the following are objectives when selecting a data type EXCEPT: support all data manipulations. represent all possible values. improve data integrity. use a lot of storage space.

d

An advantage of partitioning is: extra space and update time. increase redundancy. remote optimization. efficiency.

d

An audit trail of database changes is kept by a: subschema. change control device. before image. journalizing facility.

d

Horizontal partitioning makes sense: when less security is needed. when only one category is allowed. when partitions must be organized the same. when different categories of a table's rows are processed separately.

d

Sensitivity testing involves: deleting the associated row. seeing how accurate data are. checking to see if your teeth hurt when you brush. checking to see if missing data will greatly impact results.

d

The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. programmer productivity query design data integration data integrity

d

The value a field will assume unless the user enters an explicit value for an instance of that field is called a: range control. gurand. null value default value

d

Which of the following threats involves outside parties using information to embarrass a company? Loss of data integrity Theft and fraud Accidental loss loss of confidelity

d

Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n): table. partition. extent. tablespace

d

________ is used to undo unwanted database changes. Rollforward Encryption Restart Rollback

d

One decision in the physical design process is selecting structures. T/F

t


Ensembles d'études connexes

Chapter 2.1: Foundations Of Government

View Set

2年 CE-2 Lesson1(What's in your name?) part1

View Set

Module 10 Computer Concepts Exams

View Set

Musculoskeletal Trauma Surgeries and Disorders, Connective Tissue, and Arthritis

View Set

CTP - Chapter 11 - Working Capital Metrics

View Set

GCSE History (Medicine and Treatment): The Industrial Revolution

View Set