chapter 11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

An organization should have one data warehouse administrator for every

100 gigabytes of data in the enterprise data warehouse.

Which of the following is not a component of a repository system architecture?

A data transformation process

A data warehouse administrator has which of the following responsibilities?

A data warehouse administrator has which of the following responsibilities?

1) Which of the following is true of poor data and/or database administration?

All of the above

A trigger can be used as a security measure in which of the following ways?

All of the above

Which of the following characteristics is required of a data administration manager?

All of the above

Which of the following functions are supported by a repository engine?

All of the above

Which of the following skills are required of a database administrator?

All of the above

________ is a technical function responsible for database design, security, and disaster recovery.

Database administration

Which of the following functions model business rules?

Database analysis

Which of the following functions develop integrity controls?

Database design

Which of the following functions do cost/benefit models?

Database planning

A(n) ________ is submitted by a DBA to test the current performance of a database or predict the response time for queries.

Heartbeat query

Which of the following threats involves outside parties using information to embarrass a company?

Loss of confidentiality

The W3C standard for Web privacy is called:

Platform for Privacy Preferences.

________ is used to undo unwanted database changes.

Rollback

Which of the following is a principal type of authorization table?

Subject

Which of the following is NOT an area of concern when trying to maintain a well-tuned database?

User interface design

An open-source DBMS is:

a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.

An information repository supplies information to:

all of the above.

When incorrect data have been introduced, the database is best recovered by:

all of the above.

While views promote security by restricting user access to data, they are not adequate security measures because:

an unauthorized person may gain access to a view through experimentation.

Which of the following is a type of network security:

authentication of the client workstation.

Controls designed to restrict access and activities are called:

authorization rules.

The preferred method of fixing an aborted transaction is:

backing out the transaction.

A device to measure or detect fingerprints or signatures is called a(n) ________ device.

biometric

A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:

checkpoint facility.

The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.

concurrency control

A repository of information about a database that documents data elements of a database is called a:

data dictionary

A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked.

exclusive lock

A(n) ________ stores metadata about an organization's data and data processing resources.

information repository

An audit trail of database changes is kept by a:

journalizing facility

The extent of the database resource that is included with each lock is called the level of:

lock granularity

A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.

recovery manager

Guidelines for server security should include all of the following EXCEPT:

securing the network between client and server.

A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process and output electronic data in a secure manner is called a(n):

smart card.

Security measures for dynamic Web pages are different from static HTML pages because:

the connection requires full access to the database for dynamic pages.

A discrete unit of work that must be processed completely or not at all within a computer system is called a

transaction.

Forward recovery is faster than restore/rerun because

transactions do not have to be repeated.

A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

two-phase lock

An optimistic approach to concurrency control is called:

versioning.


Ensembles d'études connexes

SWE - chapter 2 :Software processes

View Set

Chapter 54: Management of Patients With Kidney Disorders

View Set

Who, what, when, where, why, how

View Set

accounting chapter 11: pre test/objective test

View Set

26.3- Spermatogenesis occurs in the testes and produces mature sperm

View Set

Systems Analysis and Design | Chapter 1

View Set

CH 23 Southwest and Central Asia Cultures and History S 4 Saudi Arabia Oil and Islam

View Set

Nathan Li Anatomy & Physiology Chapter 9 Nervous System

View Set

Writing a Narrative about Overcoming a Challenge | English 1

View Set