Modern Database Management - Self Check 11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Allocating 10 percent over suggested installation space is sufficient for a DBMS.

Balse

Open-source software always comes with complete documentation.

Balse

Specifying database access policies is done during the ________ phase.

Database implementation

________ makes it easier to integrate a new software tool into a development process.

Dynamic extensibility

A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager.

False

A deadlock results when two transactions try to read the same record.

False

A domain is a way to create a structure that acts like a table.

False

A repository of information about data is called a catalog.

False

Backward recovery starts with an earlier copy of the database.

False

Database applications are not very disk intensive.

False

Databases are generally the property of a single department within an organization.

False

Field-level locks are used quite often.

False

In order to perform a restore/rerun, the database must be mirrored.

False

Loss of data integrity does not impact the quality of data in a database.

False

Specifications for transactions do not need to be reviewed quickly.

False

The Information Resource Lexicon System (IRLS) is a computer software tool used to manage and control access to the information repository.

False

The granularity of locking is not a critical decision in database design.

False

The transaction log contains before- and after-images of records that have been modified.

False

There are two principal types of authorization tables: one for subjects and one for facts.

False

Three-factor authentication is most often implemented with a credit card.

False

Versioning takes the pessimistic approach to locking.

False

________ locks allow other transactions to read but not update a record or other resource.

Shared

A DBMS may perform checkpoints automatically or in response to commands in user application programs.

True

A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes.

True

A business transaction is a sequence of steps that constitute some well-defined business activity.

True

A shared lock allows other transactions to read but not update records in use.

True

A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.

True

A typical cause of database destruction is a disk crash.

True

A view can be built to present only the data to which a user requires access.

True

Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.

True

CASE tool-generated information should be fed into repositories.

True

Concurrent transactions need to be processed in isolation so that they do not interfere with each other.

True

Correct installation of the DBMS product is essential to any environment.

True

Examination and modification of the SQL code in an application may lead to performance improvements.

True

The data administrator takes responsibility for the overall management of data resources.

True

The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme.

True

The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.

True

The repository information model defines types, which should be easy to extend.

True

The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.

True

The role of database administration is typically a more hands-on, physical involvement with the management of databases.

True

Two-phase locking results in a growing phase where locks are acquired and a shrinking phase where locks are released.

True

With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.

True

A transaction that terminates abnormally is called a(n) ________ transaction.

aborted

Controls incorporated into a data management system that restrict access to data are called ________.

authorization rules

A ________ measures or detects personal characteristics such as fingerprints

biometric device

A(n) ________ is a facility by which the DBMS refuses to accept any new transactions.

checkpoint facility

The process of managing simultaneous operations against a database so that data integrity is maintained is called ________.

concurrency control

A high-level function that is responsible for the overall management of data resources in an organization is called ________.

data administration

The role of a ________ emphasizes integration and coordination of metadata across many data sources.

data wharehouse administrator

A(n) ________ is an impasse that results when two or more transactions have locked a common resource, and each waits for the other to unlock that resource.

deadlock

The coding or scrambling of data so that humans cannot read them is called ________.

encryption

Open-source DBMS are ________ software that provides the core functionality of an SQL compliant DBMS.

free

The phases of the two-phase locking protocol are referred to as the ________ phase and the ________ phase.

growing, shrinking

A ________ is a query submitted by a DBA to test the current performance of a database or to predict the response time for queries

heartbeat query

The ________ occurs when one user reads data that have been partially updated by another user.

inconsisten read problem

A(n) ________ is a component that stores metadata.

information repository

An audit trail of transactions and database changes is kept by a ________.

journalizing facility

Any data that are retrieved by a user for updating must be ________ until the update is completed or aborted.

locked

The ________ allows the DBMS to restore the database to a correct condition and restart processing transactions.

recovery manager

The ________ technique involves reprocessing the day's transactions against the backup copy of the database.

restore/rerun

A discrete unit of work that must be processed completely or not at all in a computer system is called a(n) ________.

transaction

The logical beginning and end of a transaction is called a ________.

transaction boundary

The ________ is a record of the essential data for each transaction that has been processed against the database.

transaction log

Optimistic concurrency control, or ________, restricts each transaction to a view of the database as of the time that the transaction was started.

versioning


Ensembles d'études connexes

OB/Peds Chapter 13 Promoting Nutritional Health During Pregnancy

View Set

MS2 Quiz 12: Ch. 69 Evolve Questions

View Set

Comptia Network + Practice Tests - Second Edition (N10-008) - Ch. 5

View Set

Network+ Ch2 quiz updated better

View Set

Chapter 11: The Agreement: Acceptance (SmartBook Assignment)

View Set

Romanesque Art & Architecture | FINAL EXAM

View Set

Mastering Biology Chapter 12: Mitosis

View Set

Chapter 7, Chapter 7S, Chapter 8, Chapter 9, Chapter 4, Midterm, Operations Management - Chapter 4, Operations Management - Chapter 7, Operations Management - Chapter 8, Operations Management - Chapter 9, Chapter 4 - OPMT 303, Chapter 4 Post Quiz, SC...

View Set

MED-SURG | RESPIRATORY 3 - INFECTIOUS PROCESSES 03.05 Isolation Precautions (MRSA, C. Difficile, Meningitis, Pertussis, Tuberculosis, Neutropenia)

View Set