NJIT DATABASE FINAL PART 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

8) An organization should have one data warehouse administrator for every: A) 100 users. B) 100 gigabytes of data in the enterprise data warehouse. C) department. D) processor.

100 gigabytes of data in the enterprise data warehouse.

1) Which of the following is true of poor data and/or database administration? A) Data timing problems B) Multiple entity definitions C) Unknown meanings of stored data D) All of the above

All of the above

16) A trigger can be used as a security measure in which of the following ways? A) To prohibit inappropriate actions B) To cause special handling procedures to be executed C) To cause a row to be written to a log file D) All of the above

All of the above

12) Which of the following is a type of network security? A) Authentication of the client workstation B) Password naming conventions C) Guidelines for frequency of password changes D) All of the above

Authentication of the client workstation

7) A data warehouse administrator has which of the following responsibilities? A) Build and administer an environment supportive of decision-support applications B) Build a stable architecture for the data warehouse C) Develop service level agreements with suppliers and consumers of data for the data warehouse D) All of the above

Build a stable architecture for the data warehouse

2) ________ is a technical function responsible for database design, security, and disaster recovery. A) Data administration B) Database administration C) Tech support D) Operations

Database administration

6) Which of the following functions model business rules? A) Database planning B) Database analysis C) Database design D) Operations

Database analysis

5) Which of the following functions develop integrity controls? A) Database planning B) Database analysis C) Database implementation D) Database design

Database design

4) Which of the following functions do cost/benefit models? A) Database planning B) Database analysis C) Database design D) Operations

Database planning

41) Databases are generally the property of a single department within an organization.

FALSE

43) Specifications for transactions do not need to be reviewed quickly.

FALSE

45) Open-source software always comes with complete documentation.

FALSE

47) Loss of data integrity does not impact the quality of data in a database.

FALSE

49) A domain is a way to create a structure that acts like a table.

FALSE

10) Which of the following threats involves outside parties using information to embarrass a company? A) Accidental loss B) Theft and fraud C) Loss of confidentiality D) Loss of data integrity

Loss of confidentiality

14) The W3C standard for Web privacy is called: A) the Web privacy act. B) Platform for Privacy Preferences. C) Freedom of Web Information Act. D) the Magna Carta.

Platform for Privacy Preferences.

18) Which of the following is a principal type of authorization table? A) Subject B) Transaction C) View D) Index

Subject

42) The role of database administration is typically a more hands-on, physical involvement with the management of databases.

TRUE

40) The data administrator takes responsibility for the overall management of data resources.

TRUE

44) The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.

TRUE

46) The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.

TRUE

48) A view can be built to present only the data to which a user requires access.

TRUE

50) A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.

TRUE

51) Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.

TRUE

9) An open-source DBMS is: A) a free source-code RBMS that provides the functionality of an SQL-compliant DBMS. B) a beta release of a commercial RDBMS. C) an object-oriented database management system. D) source code for a commercial RDBMS.

a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.

3) An information repository supplies information to: A) users. B) automated CASE tools. C) database management systems. D) all of the above.

all of the above.

15) While views promote security by restricting user access to data, they are not adequate security measures because: A) an unauthorized person may gain access to a view through experimentation. B) all users can read any view. C) a view's data does not change. D) none of the above.

an unauthorized person may gain access to a view through experimentation.

17) Controls designed to restrict access and activities are called: A) schemas. B) business rules. C) encryption controls. D) authorization rules.

authorization rules.

19) A device to measure or detect fingerprints or signatures is called a(n) ________ device. A) biometric B) view C) ink D) laser

biometric

11) Guidelines for server security should include all of the following EXCEPT: A) securing the network between client and server. B) guidelines for password lengths. C) password naming conventions. D) guidelines for frequency of password changes.

securing the network between client and server.

20) A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process and output electronic data in a secure manner is called a(n): smart chip. B) smart card. C) e-credit card. D) secure card.

smart card.

13) Security measures for dynamic Web pages are different from static HTML pages because: A) dynamic Web pages are built "on the fly." B) static Web pages contain more sensitive data. C) the connection requires full access to the database for dynamic pages. D) all of the above.

the connection requires full access to the database for dynamic pages.


Ensembles d'études connexes

Chapter 16- Gene Regulation in Prokaryotes

View Set

Science The Electromagnetic Spectrum Quizlet Grade 8 Module L Emily Walz

View Set

*Ch 26: Dynamics of $2-a-Day Poverty

View Set

Cellular regulation Exemplar 2.G Prostate Cancer

View Set

Module 6 Computer Concepts Exam, Computer Concepts Module 8, Computer Concept Module 9, Module 10 Computer Concepts Exam

View Set