Ch 8 for mergin

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager. T/F

F

A default value is the value that a field will always assume, regardless of what the user enters for an instance of that field. T/F

F

A domain is a way to create a structure that acts like a table. T/F

F

A file organization is a named portion of primary memory. T/F

F

A join index is a combination of two or more indexes. T/F

F

ACID support for database-as-a-service is easily provided in a cloud computing environment. T/F

F

An extent is a named portion of secondary memory allocated for the purpose of storing physical records. T/F

F

Backward recovery starts with an earlier copy of the database. T/F

F

Controls incorporated into a data management system that restrict access to data are called authentication rules. T/F

F

Denormalization is the process of transforming relations with variable-length fields into those with fixed-length fields. T/F

F

Free range partitioning is a type of horizontal partitioning in which each partition is defined by a range of values for one or more columns in the normalized table. T/F

F

Horizontal partitioning refers to the process of combining several smaller relations into a larger table. T/F

F

In order to perform a restore/rerun, the database must be mirrored. T/F

F

Loss of data integrity does not impact the quality of data in a database. T/F

F

One method to handle missing values is to substitute an exact value. T/F

F

Parallel query processing speed is not significantly different from running queries in a non-parallel mode. T/F

F

Reduced uptime is a disadvantage of partitioning. T/F

F

The Number datatype would be appropriate for a zip code. T/F

F

The logical database design always forms the best foundation for grouping attributes in the physical design. T/F

F

The restoration manager allows the DBMS to restore the database to a correct condition and restart processing transactions. T/F

F

Three-factor authentication is most often implemented with a credit card. T/F

F

Unlimited bandwidth is a characteristic of cloud computing. T/F

F

Using an index for attributes referenced in ORDER BY and GROUP BY clauses has no significant impact upon database performance. T/F

F

A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes. T/F

T

A checkpoint facility is a facility by which the DBMS refuses to accept any new transactions. T/F

T

A hashing algorithm is a routine that converts a primary key value into a relative record address. T/F

T

A key component of the Sarbanes-Oxley Act was enacted to ensure the integrity of IT infrastructure in use within an organization. T/F

T

A pointer is a field of data that can be used to locate a related field or record of data. T/F

T

A tablespace is a named set of disk storage elements in which physical files for the database tables may be stored. T/F

T

A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day. T/F

T

A view can be built to present only the data to which a user requires access. T/F

T

Along with table scans, other elements of a query can be processed in parallel. T/F

T

An audit trail of transactions and database changes is kept by a journalizing facility T/F

T

Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data. T/F

T

Denormalization almost always leads to more storage space for raw data. T/F

T

Examination and modification of the SQL code in an application may lead to performance improvements. T/F

T

Fast data retrieval is one factor to consider when choosing a file organization for a particular database file. T/F

T

Hash partitioning spreads data evenly across partitions independent of any partition key value. T/F

T

In a Heap file organization, files are not stored in any particular order. T/F

T

Keeping the zip code with the city and state in a table is a typical form of denormalization. t/f

T

Live migration from one environment to another in cloud computing is a challenge. T/F

T

One objective of selecting a data type is to minimize storage space. T/F

T

Platform-as-a-service is an approach for providing infrastructure resources and tools for developers to be productive. T/F

T

Security is one advantage of partitioning. T/F

T

Sensitivity testing involves ignoring missing data unless knowing a value might significantly change results. T/F

T

The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme. T/F

T

The goal of database security is the protection of data from accidental or intentional threats to its integrity and access. T/F

T

The restore/rerun technique involves reprocessing the day's transactions against the backup copy of the database. T/F

T

VarChar2 would be appropriate for a user that wanted a text datatype for LastName that would only consume the required space. T/F

T

With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data. T/F

T

n a sequential file, the records are stored in sequence according to a primary key value. T/F

T

Correct installation of the DBMS product is essential to any environment.

True

A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a: checkpoint facility. database change log. backup facility. recovery manager.

a

A cloud computing approach in which the service consists mainly of hardware and systems software resources is called: Infrastructure-as-a-service. IDE. Software-as-a-service. Platform-as-a-service

a

A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a: hash index table. hash key. multi-indexed file organization. hashed file organization.

a

A key decision in the physical design process is: selecting structures. deciding on the monitor. deciding the e-r diagrams. ignoring the size of the database.

a

All of the following are advantages to cloud-based computing EXCEPT: ACID support for database as a service. elasticity. organizations can explore new data management technologies more easily no need for initial investment in hardware, physical facilities and systems software.

a

All of the following are disadvantages to cloud-based computing EXCEPT: the visibility of costs of data management is better. DBaaS is still struggling to provide ACID properties of databases. live migration from one environment to another is a challenge. the promise of elasticity is not fulfilled because the model will not adapt to changing requirements.

a

All of the following are valid datatypes in Oracle 12c EXCEPT: BOOLEAN. BLOB. VARCHAR2. NUMBER.

a

An audit trail of transactions and database changes is kept by a ________. journalizing facility. before image. change control device. subschema

a

Designing physical files requires ________ of where and when data are used in various ways. descriptions maps keys hints

a

Distributing the rows of data into separate files is called: horizontal partitioning. file allocation. vertical partitioning. normalization

a

One field or combination of fields for which more than one record may have the same combination of values is called a(n): secondary key linked key composite key index

a

Sarbanes-Oxley Act was enacted to ensure the integrity of: public companies' financial statements. SQL. Entity-Relationship Diagrams. private companies' shareholders meetings.

a

The smallest unit of application data recognized by system software is a: field. column. data type. row

a

Which of the following is an objective of selecting a data type? Improve data integrity Maximize storage space Limit security Represent a small number of possible values

a

Which of the following is an objective of selecting a data type? Improve data integrity Limit security Represent a small number of possible values Maximize storage space

a

While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the: operating system. XML. user. CEO.

a

A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called: Platform-as-a-service. Software-as-a-service. Soft-computing-service. Infrastructure-as-a-service.

b

A detailed coding scheme recognized by system software for representing organizational data is called a(n): DBMS code. data type. SQL. DB layout.

b

A device to measure or detect fingerprints or signatures is called a(n) ________ device. ink biometric laser view

b

A disadvantage of partitioning is: remote optimization. extra space and update time. shorter technology spans. simplicity.

b

A discrete unit of work that must be processed completely or not at all in a computer system is called a(n) ________. journalizing facility. transaction. change control device. before image.

b

A factor to consider when choosing a file organization is: DDL. efficient storage. inefficient data retrieval. DML.

b

A file organization where files are not stored in any particular order is considered a: hash key. heap file organization. multi-indexed file organization. hashed file organization.

b

A method for handling missing data is to: delete the associated row. track missing data with special reports. perform insensitivity testing. substitute with random numbers for the missing data.

b

A(n) ________ is a field of data used to locate a related field or record. lock pointer index key

b

All of the following are common denormalization opportunities EXCEPT: reference data. a one-to-many relationship. two entities with a one-to-one relationship. a many-to-many relationship with nonkey attributes.

b

In which type of file is multiple key retrieval not possible? Indexed Hashed Clustered Sequential

b

When incorrect data have been introduced, the database is best recovered by: starting with a new ERD. restarting from the most recent checkpoint and processing subsequent transactions. reloading RDMS software. formatting server.

b

Which type of file is easiest to update? Clustered Hashed Sequential Indexed

b

________ partitioning distributes the columns of a table into several separate physical records. Horizontal Vertical Crossways Final

b

A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers, and join tables to prepare query results is the: explain query. show optimization. explain plan. analyze query.

c

A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called: query optimization. perpendicular query processing. parallel query processing. multiple partition queries

c

A trigger can be used as a security measure in which of the following ways? To conduct a DFD analysis To check for viruses To cause special handling procedures to be executed To design a database

c

An appropriate datatype for adding a sound clip would be: CHAR. DATE. BLOB. VARCHAR

c

An index on columns from two or more tables that come from the same domain of values is called a: bitmap index. transaction index. join index. multivalued index

c

An integrity control supported by a DBMS is: GUI guards. security. range control. substitute estimates.

c

Arequirement to begin designing physical files and databases is: implementation complete. all datatypes determined. normalized relations. physical tables created.

c

Controls designed to restrict access and activities are called: business rules. schemas. authorization rules. encryption controls.

c

Forward recovery is faster than restore/rerun because: images are mirrored. security can be avoided. transactions do not have to be repeated. systems are more complete.

c

The coding or scrambling of data so that humans cannot read them is called ________. hiding. encoding. encryption. demarcation.

c

The preferred method of fixing an aborted transaction is: repairing the schema. switching. backing out the transaction. duplication of data.

c

Which type of file is most efficient with storage space? Indexed Hashed Sequential Clustered

c

A ________ is a DBMS module that restores the database to a correct condition when a failure occurs. restart facility backup facility transaction logger recovery manager

d

A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called: Tools-as-a-service. Software-as-a-service. Infrastructure-as-a-service. Platform-as-a-service.

d

A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process, and output electronic data in a secure manner is called a(n): smart chip. secure card. e-credit card. smart card

d

A form of denormalization where the same data are purposely stored in multiple places in the database is called: horizontal partitioning. advanced placement. data duplication. data replication.

d

A method to allow adjacent secondary memory space to contain rows from several tables is called: compiling. cluttering. concatenating. clustering.

d

A transaction that terminates abnormally is called a(n) ________ transaction. terminated deleted completed aborted

d

All of the following are objectives when selecting a data type EXCEPT: support all data manipulations. represent all possible values. improve data integrity. use a lot of storage space.

d

An advantage of partitioning is: extra space and update time. increase redundancy. remote optimization. efficiency.

d

An audit trail of database changes is kept by a: subschema. change control device. before image. journalizing facility.

d

Horizontal partitioning makes sense: when less security is needed. when only one category is allowed. when partitions must be organized the same. when different categories of a table's rows are processed separately.

d

Sensitivity testing involves: deleting the associated row. seeing how accurate data are. checking to see if your teeth hurt when you brush. checking to see if missing data will greatly impact results.

d

The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. programmer productivity query design data integration data integrity

d

The value a field will assume unless the user enters an explicit value for an instance of that field is called a: range control. gurand. null value default value

d

Which of the following threats involves outside parties using information to embarrass a company? Loss of data integrity Theft and fraud Accidental loss loss of confidelity

d

Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n): table. partition. extent. tablespace

d

________ is used to undo unwanted database changes. Rollforward Encryption Restart Rollback

d

One decision in the physical design process is selecting structures. T/F

t


Ensembles d'études connexes

Chapter 2.1: Foundations Of Government

View Set

2年 CE-2 Lesson1(What's in your name?) part1

View Set

Module 10 Computer Concepts Exams

View Set

Musculoskeletal Trauma Surgeries and Disorders, Connective Tissue, and Arthritis

View Set

AP HUMAN GEOGRAPHY ALL VOCAB TERMS

View Set

CTP - Chapter 11 - Working Capital Metrics

View Set

GCSE History (Medicine and Treatment): The Industrial Revolution

View Set