Ch8 final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Open-source software always comes with complete documentation. T/F

F

A DBMS may perform checkpoints automatically or in response to commands in user application programs. T/F

T

A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes. T/F

T

A shared lock allows other transactions to read but not update records in use. T/F

T

A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day. T/F

T

A typical cause of database destruction is a disk crash. T/F

T

The data administrator takes responsibility for the overall management of data resources. T/F

T

The repository information model defines types, which should be easy to extend. T/F

T

A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a: checkpoint facility. database change log. backup facility. recovery manager.

a

An advantage of partitioning is: remote optimization. efficiency. increase redundancy. extra space and update time.

b

A file organization is a named portion of primary memory. T/F

F

Versioning takes the pessimistic approach to locking. T/F

F

A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager. T/F

F

A deadlock results when two transactions try to read the same record. T/F

F

A default value is the value that a field will always assume, regardless of what the user enters for an instance of that field. T/F

F

A domain is a way to create a structure that acts like a table. T/F

F

A repository of information about data is called a catalog. T/F

F

Allocating 10 percent over suggested installation space is sufficient for a DBMS. T/F

F

Backward recovery starts with an earlier copy of the database. T/F

F

Controls incorporated into a data management system that restrict access to data are called authentication rules. T/F

F

Denormalization is the process of transforming relations with variable-length fields into those with fixed-length fields. T/F

F

Field-level locks are used quite often. T/F

F

Free range partitioning is a type of horizontal partitioning in which each partition is defined by a range of values for one or more columns in the normalized table. T/F

F

Horizontal partitioning refers to the process of combining several smaller relations into a larger table. T/F

F

In order to perform a restore/rerun, the database must be mirrored. T/F

F

Loss of data integrity does not impact the quality of data in a database. T/F

F

One method to handle missing values is to substitute an exact value. T/F

F

The Information Resource Lexicon System (IRLS) is a computer software tool used to manage and control access to the information repository. T/F

F

The granularity of locking is not a critical decision in database design. T/F

F

The transaction log contains before- and after-images of records that have been modified. T/F

F

There are two principal types of authorization tables: one for subjects and one for facts. T/F

F

A view can be built to present only the data to which a user requires access. T/F

T

Along with table scans, other elements of a query can be processed in parallel. T/F

T

An audit trail of transactions and database changes is kept by a journalizing facility. T/F

T

Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data. T/F

T

CASE tool-generated information should be fed into repositories. T/F

T

Concurrent transactions need to be processed in isolation so that they do not interfere with each other. T/F

T

Correct installation of the DBMS product is essential to any environment. T/F

T

Denormalization almost always leads to more storage space for raw data. T/F

T

Examination and modification of the SQL code in an application may lead to performance improvements. T/F

T

In a Heap file organization, files are not stored in any particular order. T/F

T

In a sequential file, the records are stored in sequence according to a primary key value. T/F

T

Live migration from one environment to another in cloud computing is a challenge. T/F

T

One decision in the physical design process is selecting structures. T/F

T

One objective of selecting a data type is to minimize storage space. T/F

T

Security is one advantage of partitioning. T/F

T

Sensitivity testing involves ignoring missing data unless knowing a value might significantly change results. T/F

T

The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme. T/F

T

The goal of database security is the protection of data from accidental or intentional threats to its integrity and access. T/F

T

Two-phase locking results in a growing phase where locks are acquired and a shrinking phase where locks are released. T/F

T

VarChar2 would be appropriate for a user that wanted a text datatype for LastName that would only consume the required space. T/F

T

With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data. T/F

T

A ________ is a query submitted by a DBA to test the current performance of a database or to predict the response time for queries. Hearbeat query optimize query satisfaction query

a

A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process and output electronic data in a secure manner is called a(n): smart card. smart chip. e-credit card. secure card.

a

A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called: parallel query processing. perpendicular query processing. multiple partition queries. query optimization.

a

A(n) ________ is a component that stores metadata. information repository index data terms

a

All of the following are valid datatypes in Oracle 12c EXCEPT: BOOLEAN. VARCHAR2. BLOB. NUMBER.

a

Controls incorporated into a data management system that restrict access to data are called ________. authorization rules permissions status

a

Distributing the rows of data into separate files is called: horizontal partitioning. file allocation. vertical partitioning. normalization.

a

The ________ occurs when one user reads data that have been partially updated by another user. inconsisten read problem

a

The ________ technique involves reprocessing the day's transactions against the backup copy of the database. restore/rerun

a

Which of the following functions develop integrity controls? database design database control database implementation

a

Which of the following functions model business rules? database analysis database design database control

a

Which of the following is an objective of selecting a data type? Improve data integrity Maximize storage space Limit security Represent a small number of possible values

a

While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the: operating system. user. XML. CEO.

a

A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called: Platform-as-a-service. Software-as-a-service. Soft-computing-service. Infrastructure-as-a-service.

b

A detailed coding scheme recognized by system software for representing organizational data is called a(n): DBMS code. data type. SQL. DB layout.

b

A form of denormalization where the same data are purposely stored in multiple places in the database is called: advanced placement. data replication. data duplication. horizontal partitioning.

b

A method for handling missing data is to: delete the associated row. track missing data with special reports. perform insensitivity testing. substitute with random numbers for the missing data.

b

All of the following are common denormalization opportunities EXCEPT: reference data. a one-to-many relationship. two entities with a one-to-one relationship. a many-to-many relationship with nonkey attributes.

b

One field or combination of fields for which more than one record may have the same combination of values is called a(n): composite key. secondary key. index. linked key.

b

The logical beginning and end of a transaction is called a ________. transaction completeness transaction boundary transaction defect

b

The smallest unit of application data recognized by system software is a: data type. field. column. row.

b

When incorrect data have been introduced, the database is best recovered by: starting with a new ERD. restarting from the most recent checkpoint and processing subsequent transactions. reloading RDMS software. formatting server.

b

Which type of file is most efficient with storage space? Clustered Sequential Indexed Hashed

b

________ locks allow other transactions to read but not update a record or other resource. private shared public

b

A disadvantage of partitioning is: remote optimization. simplicity. extra space and update time. shorter technology spans.

c

A discrete unit of work that must be processed completely or not at all within a computer system is called a Journalizing facility. change control device. transaction. before image.

c

A factor to consider when choosing a file organization is: DDL. DML. efficient storage. inefficient data retrieval.

c

A key decision in the physical design process is: deciding on the monitor. deciding the e-r diagrams. selecting structures. ignoring the size of the database.

c

A requirement to begin designing physical files and databases is: implementation complete. all datatypes determined normalized relations. physical tables created.

c

A trigger can be used as a security measure in which of the following ways? To conduct a DFD analysis To check for viruses To cause special handling procedures to be executed To design a database

c

All of the following are advantages to cloud-based computing EXCEPT: no need for initial investment in hardware, physical facilities and systems software. elasticity. ACID support for database as a service. organizations can explore new data management technologies more easily.

c

An integrity control supported by a DBMS is: GUI guards. security. range control. substitute estimates.

c

Controls designed to restrict access and activities are called: schemas. business rules. authorization rules. encryption controls.

c

The coding or scrambling of data so that humans cannot read them is called ________. hiding. encoding. encryption. demarcation.

c

The process of managing simultaneous operations against a database so that data integrity is maintained is called ________. Seperate control duplicate control concurrency control

c

The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. data integration programmer productivity data integrity query design

c

________ is used to undo unwanted database changes. Rollforward Encryption Rollback Restart

c

A ________ is a DBMS module that restores the database to a correct condition when a failure occurs. transaction logger backup facility restart facility recovery manager

d

A cloud computing approach in which the service consists mainly of hardware and systems software resources is called: Software-as-a-service. Platform-as-a-service. IDE. Infrastructure-as-a-service.

d

A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called: Tools-as-a-service. Software-as-a-service. Infrastructure-as-a-service. Platform-as-a-service.

d

A method to allow adjacent secondary memory space to contain rows from several tables is called: compiling. cluttering. concatenating. clustering.

d

A transaction that terminates abnormally is called a(n) ________ transaction. terminated completed deleted aborted

d

All of the following are objectives when selecting a data type EXCEPT: improve data integrity. represent all possible values. support all data manipulations. use a lot of storage space.

d

In which type of file is multiple key retrieval not possible? Clustered Sequential Indexed Hashed

d


संबंधित स्टडी सेट्स

Critical Reading, Writing, and Thinking

View Set

Gurnick EMB-Lecture 3 (#4 in Moodle)

View Set

Review (True-False): Linear Motion

View Set

Chapter 73: Terrorism, Mass Casualty, and Disaster Nursing, CH 37: Management of patient with HIV and AIDS, Chapter 36, Chapter 66, Chapter 1 - Yoder Wise, Chapter 2 - Yoder Wise, Chapter 3 - Yoder Wise, Chapter 5 - Yoder Wise, Chapter 6 - Yoder Wise...

View Set