AIST-3410 After Midterm
An appropriate datatype for adding a sound clip would be:
BLOB.
All of the following are valid datatypes in Oracle 12c EXCEPT:
BOOLEAN
An extent is a named portion of secondary memory allocated for the purpose of storing physical records.
FALSE
Free range partitioning is a type of horizontal partitioning in which each partition is defined by a range of values for one or more columns in the normalized table.wws
FALSE
Horizontal partitioning is very different from creating a supertype/subtype relationship.
FALSE
Horizontal partitioning refers to the process of combining several smaller relations into a larger table.
FALSE
In order to perform a restore/rerun, the database must be mirrored.
FALSE
Which of the following threats involves outside parties using information to embarrass a company?
Loss of confidentiality
In which data model would a code table appear?
Physical
A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called:
Platform-as-a-service
Which type of file is most efficient with storage space?
Sequential
A DBMS may perform checkpoints automatically or in response to commands in user application programs.
TRUE
A hashing algorithm is a routine that converts a primary key value into a relative record address.
TRUE
A pointer is a field of data that can be used to locate a related field or record of data.
TRUE
A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.
TRUE
A view can be built to present only the data to which a user requires access.
TRUE
Along with table scans, other elements of a query can be processed in parallel.
TRUE
Controls incorporated into a data management system that restrict access to data are called authentication rules.
TRUE
Efficient database structures will be beneficial only if queries and the underlying database management system are tuned to properly use the structures.
TRUE
Hash partitioning spreads data evenly across partitions independent of any partition key value.
TRUE
In a sequential file, the records are stored in sequence according to a primary key value.
TRUE
Indexes are most useful for columns that frequently appear in WHERE clauses of SQL commands, either to qualify the rows to select or for linking.
TRUE
Live migration from one environment to another in cloud computing is a challenge
TRUE
One decision in the physical design process is selecting structures.
TRUE
One objective of selecting a data type is to minimize storage space.
TRUE
Platform-as-a-service is an approach for providing infrastructure resources and tools for developers to be productive.
TRUE
Requirements for response time, data security, backup, and recovery are all requirements for physical design.
TRUE
The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme.
TRUE
________ partitioning distributes the columns of a table into several separate physical records.
Vertical
The preferred method of fixing an aborted transaction is:
backing out the transaction.
A device to measure or detect fingerprints or signatures is called a(n) ________ device.
biometric
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:
checkpoint facility.
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space.
data integrity
The value a field will assume unless the user enters an explicit value for an instance of that field is called a:
default value.
The coding or scrambling of data so that humans cannot read them is called:
encryption.
A contiguous section of disk storage space is called a(n):
extent.
A disadvantage of partitioning is:
extra space and update time.
The smallest unit of application data recognized by system software is a:
field.
A file organization where files are not stored in any particular order is considered a:
heap file organization.
An audit trail of database changes is kept by a:
journalizing facility
A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called:
parallel query processing.
A(n) ________ is a field of data used to locate a related field or record.
pointer
An integrity control supported by a DBMS is:
range control.
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.
recovery manager
One field or combination of fields for which more than one record may have the same combination of values is called a(n):
secondary key.
Guidelines for server security should include all of the following EXCEPT:
securing the network between client and server.
A key decision in the physical design process is:
selecting structures.
All of the following are disadvantages to cloud-based computing EXCEPT:
the visibility of costs of data management is better
A method for handling missing data is to:
track missing data with special reports
Database access frequencies are estimated from:
transaction volumes.
A discrete unit of work that must be processed completely or not at all within a computer system is called a:
transaction.
Forward recovery is faster than restore/rerun because:
transactions do not have to be repeated.
All of the following are characteristics of cloud technologies EXCEPT:
unlimited bandwidth.
Parallel query processing speed is not significantly different from running queries in a non-parallel mode.
FALSE
The record log is a record of the essential data for each transaction that has been processed against the database.
FALSE
The restoration manager allows the DBMS to restore the database to a correct condition and restart processing transactions.
FALSE
A transaction that terminates abnormally is called a(n) ________ transaction.
aborted
While views promote security by restricting user access to data, they are not adequate security measures because:
an unauthorized person may gain access to a view through experimentation.
When incorrect data have been introduced, the database is best recovered by:
restarting from the most recent checkpoint and processing subsequent transactions.