Database Management Chapter 8
Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may be locked and are exclusive locks the only ones permitted?
concurrent update
____ locks forbid any other user from accessing the data in any way.
exclusive
Management approval is not required before the security policies and procedures can be implemented.
false
Programmers monitor database usage to detect potential security violations.
false
SQL is an example of a procedural language.
false
When a company decides to purchase a new DBMS, the CEO leads the DBMS evaluation and selection effort.
false
(HIPAA)
is a federal law that specifies the rules for storing, handling, and protecting health-care transactions.
The ____ is responsible for providing training in the use of the DBMS.
DBA
____ integrity is the constraint that says that the values in foreign keys must match values already in the database.
Referential
A shared lock permits other users to read the data in the database.
true
Damage to a database can occur through a physical incident such as a computer malfunction.
true
QBE is an example of a nonprocedural language.
true
The DBA is responsible for DBMS maintenance, data dictionary management, and training.
true
Changing the database design to improve the performance is called ____ the design.
tuning
Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time?
Limitations
production system, or live system
The hardware, software, and database for the users
tuning
change the database design to improve performance;
A ____ is a place where a record of certain corporate data is kept.
data archive
Context-sensitive help
means that if a user is having trouble and asks for help, the DBMS will provide assistance for the particular feature being used at the time the user asks for the help.
shared lock
permits other users to read the data; with an exclusive lock, no other user may access the data in any way.
After the database designers complete the information-level design, the DBA does the ____-level design.
physical
By default, Access and other DBMSs create indexes automatically for the ____ keys.
primary and foreign
Department of Defense (DOD) 5015.2 Standard
provides data management requirements for the DOD and for companies supplying or dealing with the DOD.
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas?
replication and disturbed databases
disaster recovery plan
specifies the ongoing and emergency actions and procedures required to ensure data availability if a disaster occurs.
to implement and enforce security DBA uses such features as journalism and metadata.
False
After the DBMS is purchased, the ____ has primary responsibility for installation and maintenance.
DBA
The ____ determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog to ensure that users access the database only in ways in which they are entitled to do so.
DBA
The ____ establishes the naming conventions for tables, fields, and indexes in the data dictionary.
DBA
Which of the following DBMS evaluation categories does the following question relate to: Is it a simple catalog or can it contain more content, such as information about programs and the various data items these programs access?
Data dictonary
Which of the following DBMS evaluation categories does the following question relate to: Does the vendor of the DBMS supply printed or online training manuals and how good are the manuals?
Documentation and Training
Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export?
Potability
An internal company network that uses software tools typically used on the Internet and World Wide Web is called a virtual network.
False
Another term for production system is the sandbox.
False
Any changes made in the database structure are communicated only to the affected users.
False
In order to develop new programs, the programmers need access to the information in the DBMS. They are given access to the ____.
Test System
If a DBMS lacks essential security features, the DBA might create or purchase special security programs that provide the missing features.
True
The DBA determines and documents the database access privileges for all users.
True
To protect an organization's data against physical damage, the DBA creates and implements backup and recovery procedures as part of a disaster recovery plan.
True
The Sarbanes-Oxley (SOX) Act of 2002
a federal law that specifies data retention and verification requirements for public companies, requires CEOs and CFOs to certify financial statements and makes it a crime to destroy or tamper with financial records.
data archive or archive
a place where a record of certain corporate data is kept.
uninterruptible power supply (UPS)
a power source such as a battery or fuel cell, for short interruptions and a power generator for longer outages.
Denormalizing
converts a table that is in third normal form to a table that is no longer in third normal form.
redundant array of inexpensive/independent drives (RAID)
database updates are replicated to multiple hard drives so that an organization can continue to process database updates after losing one of its hard drives
____ converts a table that is in third normal form to a table no longer in third normal form.
denormalization
hot site
is a backup site that an organization can switch to in minutes or hours because the site is completely equipped with duplicate hardware, software, and data.
warm site
is a backup site that is equipped with duplicate hardware and software but not data, so it takes longer to start processing at a warm site compared to a hot site.
local area network [LAN]
is a configuration of several computers connected together that allows users to share a variety of hardware and software resources.
Presidential Records Act
is a federal law that regulates the data retention requirements for all communications, including electronic communications, of U.S. presidents and vice presidents.
Patriot Act of 2001
is a federal law that specifies data retention requirements for the identification of customers opening accounts at financial institutions, allows law enforcement agencies to search companies' and individuals' records and communications, and expands the government's authority to regulate financial transactions.
intranet
is an internal company network that uses software tools typically used on the Internet and the World Wide Web.
DBA
is the person who is responsible for supervising the database and the use of the DBMS.
Which of the following DBMS evaluation categories does the following question relate to: On what operating system and hardware is the DBMS supported?
limitations
Tables with indexes allow faster searches, but slower performance on ____.
updates
test system, or sandbox
use to develop new programs and modify existing programs.
