Quiz 4
________ is a technical function responsible for database design, security, and disaster recovery. Data administration Database administration Tech support Operations
Database administration
Which of the following functions develop integrity controls? Database planning Database analysis Database implementation Database design
Database design
In MySQL workbench, Views are generally stored under tables. T F
F
Oracle is an example of open-source DBMS True False
False
Which of the following MySQL commands is used to recover a transaction? REVOKE DROP GRANT ROLLBACK
ROLLBACK
A business analyst has the privilege to view and update a particular schema. Which of the following SQL statements will change privileges such that he/she cannot update anymore? Drop user businessanalyst@localhost Delete update privilege on schema Withdraw update privilege from businessanalyst@localhost Revoke update on schema from businessanalyst@localhost
Revoke update on schema from businessanalyst@localhost
A deadlock results when two or more transactions need a common resource, but neither can proceed until the other releases the resource it wants. T F
T
According to a 2017 study in MIT Sloan Management review, data quality issues cost companies 15%-25% of their revenue. T F
T
Lack of organizational commitment is a potential reason for organizations deteriorated data quality. T F
T
The default value of autocommit in MySQL is 1 T F
T
The following scenario represents a case in which a concurrency control mechanism is needed. https://docs.google.com/document/d/12_iiUK8z8yovnQPj-HOToLFmUXkiUDZ0ToisZ2eBKQw/edit T F
T
Views can be used to improve database security. T F
T
An open-source DBMS is: a free source-code RBMS that provides the functionality of an SQL-compliant DBMS. a beta release of a commercial RDBMS. an object-oriented database management system. source code for a commercial RDBMS.
a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
A device to measure or detect fingerprints or signatures is called a(n) ________ device. biometric view ink laser
biometric
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions. logging concurrency control transaction authorization multiple management
concurrency control
Including data capture controls (i.e., dropdown lists) helps reduce ________ deteriorated data problems. external data source inconsistent metadata data entry lack of organizational commitment
data entry
Converting data from the format of its source to the format of its destination is called: data transformation. data loading. data scrubbing. data storage.
data transformation.
The coding or scrambling of data so that humans cannot read them is called: demarcation. hiding. encoding. encryption.
encryption.
Getting poor data from a supplier is a(n) ________ reason for deteriorated data quality. external data source inconsistent metadata data entry problem lack of organizational commitment
external data source
Data governance can be defined as: a means to slow down the speed of data. high-level organizational groups and processes that oversee data stewardship. a government task force for defining data quality. a means to increase the speed of data.
high-level organizational groups and processes that oversee data stewardship.