CS331 7A

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following functions do cost/benefit models? A) Database planning B) Database analysis C) Database design D) Operations

A) Database planning

A domain is a way to create a structure that acts like a table. T/F

F

Databases are generally the property of a single department within an organization. T/F

F

Loss of data integrity does not impact the quality of data in a database. T/F

F

Open-source software always comes with complete documentation. T/F

F

Specifications for transactions do not need to be reviewed quickly. T/F

F

The goal of database security is the protection of data from accidental or intentional threats to its integrity and access. T/F

F

A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day. T/F

T

A view can be built to present only the data to which a user requires access. T/F

T

Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data. T/F

T

The data administrator takes responsibility for the overall management of data Resources. T/F

T

The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources. T/F

T

The role of database administration is typically a more hands-on, physical involvement with the management of databases. T/F

T

________ is used to undo unwanted database changes. A) Rollback B) Rollforward C) Restart D) Encryption

A) Rollback

An information repository supplies information to: A) users. B) automated CASE tools. C) database management systems. D) all of the above.

D) all of the above.

Which of the following is a type of network security? A) Authentication of the client workstation B) Password naming conventions C) Guidelines for frequency of password changes D) All of the above

A) Authentication of the client workstation

Which of the following is a principal type of authorization table? A) Subject B) Transaction C) View D) Index

A) Subject

An open-source DBMS is: A) a free source-code RBMS that provides the functionality of an SQL-compliant DBMS. B) a beta release of a commercial RDBMS. C) an object-oriented database management system. D) source code for a commercial RDBMS.

A) a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.

While views promote security by restricting user access to data, they are not adequate security measures because: A) an unauthorized person may gain access to a view through experimentation. B) all users can read any view. C) a view's data does not change. D) none of the above.

A) an unauthorized person may gain access to a view through experimentation.

A device to measure or detect fingerprints or signatures is called a(n) ________ device. A) biometric B) view C) ink D) laser

A) biometric

A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a: A) checkpoint facility. B) backup facility. C) recovery manager. D) database change log.

A) checkpoint facility.

Guidelines for server security should include all of the following EXCEPT: A) securing the network between client and server. B) guidelines for password lengths. C) password naming conventions. D) guidelines for frequency of password changes.

A) securing the network between client and server.

Forward recovery is faster than restore/rerun because: A) transactions do not have to be repeated. B) security can be avoided. C) images are mirrored. D) systems are more complete.

A) transactions do not have to be repeated.

An optimistic approach to concurrency control is called: A) versioning. B) denormalization. C) deadlock resolution. D) none of the above.

A) versioning.

An organization should have one data warehouse administrator for every: A) 100 users. B) 100 gigabytes of data in the enterprise data warehouse. C) department. D) processor.

B) 100 gigabytes of data in the enterprise data warehouse.

________ is a technical function responsible for database design, security, and disaster recovery. A) Data administration B) Database administration C) Tech support D) Operations

B) Database administration

Which of the following functions model business rules? A) Database planning B) Database analysis C) Database design D) Operations

B) Database analysis

The W3C standard for Web privacy is called: A) the Web privacy act. B) Platform for Privacy Preferences. C) Freedom of Web Information Act. D) the Magna Carta.

B) Platform for Privacy Preferences.

The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions. A) logging B) concurrency control C) transaction authorization D) multiple management

B) concurrency control

A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked. A) record controller B) exclusive lock C) authorization rule D) shared lock

B) exclusive lock

A(n) ________ stores metadata about an organization's data and data processing resources. A) DBA B) information repository C) organizational system catalog D) data dictionary

B) information repository

A ________ is a DBMS module that restores the database to a correct condition when a failure occurs. A) backup facility B) recovery manager C) restart facility D) transaction logger

B) recovery manager

A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process and output electronic data in a secure manner is called a(n): A) smart chip. B) smart card. C) e-credit card. D) secure card.

B) smart card.

A discrete unit of work that must be processed completely or not at all within a computer system is called a: A) change control device. B) transaction. C) before image. D) journalizing facility.

B) transaction.

Which of the following is not a component of a repository system architecture? A) An informational model B) The repository engine C) A data transformation process D) The repository database

C) A data transformation process

Which of the following threats involves outside parties using information to embarrass a company? A) Accidental loss B) Theft and fraud C) Loss of confidentiality D) Loss of data integrity

C) Loss of confidentiality

A(n) ________ is submitted by a DBA to test the current performance of a database or predict the response time for queries. A) elusive query B) performance test C) heartbeat query D) none of the above

C) heartbeat query

The extent of the database resource that is included with each lock is called the level of: A) impact. B) management. C) lock granularity. D) none of the above.

C) lock granularity.

Security measures for dynamic Web pages are different from static HTML pages because: A) dynamic Web pages are built "on the fly." B) static Web pages contain more sensitive data. C) the connection requires full access to the database for dynamic pages. D) all of the above.

C) the connection requires full access to the database for dynamic pages.

A data warehouse administrator has which of the following responsibilities? A) Build and administer an environment supportive of decision-support applications B) Build a stable architecture for the data warehouse C) Develop service level agreements with suppliers and consumers of data for the data warehouse D) All of the above

D) All of the above

A trigger can be used as a security measure in which of the following ways? A) To prohibit inappropriate actions B) To cause special handling procedures to be executed C) To cause a row to be written to a log file D) All of the above

D) All of the above

Which of the following functions are supported by a repository engine? A) Object management B) Relationship management C) Version management D) All of the above

D) All of the above

Which of the following is true of poor data and/or database administration? A) Data timing problems B) Multiple entity definitions C) Unknown meanings of stored data D) All of the above

D) All of the above

Which of the following functions develop integrity controls? A) Database planning B) Database analysis C) Database implementation D) Database design

D) Database design

Which of the following is NOT an area of concern when trying to maintain a well- tuned database? A) Memory usage B) CPU usage C) Input/output contention D) User interface design

D) User interface design

When incorrect data have been introduced, the database is best recovered by: A) backward recovery, if the error has been discovered soon enough. B) human intervention for only a few errors. C) restarting from the most recent checkpoint and processing subsequent transactions. D) all of the above.

D) all of the above.

Controls designed to restrict access and activities are called: A) schemas. B) business rules. C) encryption controls. D) authorization rules.

D) authorization rules.

The preferred method of fixing an aborted transaction is: A) repairing the schema. B) switching. C) duplication of data. D) backing out the transaction.

D) backing out the transaction.

A repository of information about a database that documents data elements of a database is called a: A) schema. B) subschema. C) view. D) data dictionary.

D) data dictionary.

An audit trail of database changes is kept by a: A) change control device. B) subschema. C) before image. D) journalizing facility.

D) journalizing facility.

A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released. A) record controller B) exclusive lock C) authorization rule D) two-phase lock

D) two-phase lock


Ensembles d'études connexes

The verb Ir- to go/ ¿Adónde vas? Where are you going?

View Set

#101-150 Physiological Integrity Practice Questions

View Set

Module 11 - Residential Electrical Services

View Set

PrepU Ch. 50: Diabetes Mellitus and the Metabolic Syndrome

View Set