Chapter 12, chapter 11, asdf10
________ duplicates data across databases.
Data propagation
All of the following are popular architectures for Master Data Management EXCEPT:
Normalization
A(n) ________ stores metadata about an organization's data and data processing resources.
information repository
A centralized strategy has ________ expandability.
poor
An organization should have one data warehouse administrator for every
100 gigabytes of data in the enterprise data warehouse.
Which of the following is not a component of a repository system architecture?
A data transformation process
A data warehouse administrator has which of the following responsibilities?
A data warehouse administrator has which of the following responsibilities?
Which of the following are key steps in a data quality program?
Apply TQM principles and practices.
Which of the following is true of distributed databases?
Better local control
hich type of index is commonly used in data warehousing environments?
Bit-mapped index
________ insures that a transaction is successfully completed or else it is aborted.
Commit protocol
Which of the following is true about horizontal partitioning?
Data can be stored to optimize local access.
________ is a technical function responsible for database design, security, and disaster recovery.
Database administration
Which of the following functions model business rules?
Database analysis
Which of the following functions develop integrity controls?
Database design
Which of the following functions do cost/benefit models?
Database planning
Which of the following supports a simple path to other databases, without the benefits of one logical database?
Gateways
A(n) ________ is submitted by a DBA to test the current performance of a database or predict the response time for queries.
Heartbeat query
Which of the following environments uses a different DBMS at each node, and supports local databases for unique data requests?
Heterogeneous; federated
Which of the following environments uses the same DBMS at each node with a central or master DBMS coordinating database access across nodes?
Homogeneous; nonautonomous
________ is a design goal for a distributed database, which says a user does not need to know the location of data to use the data.
Location transparency
Which of the following threats involves outside parties using information to embarrass a company?
Loss of confidentiality
The methods to ensure the quality of data across various subject areas are called:
Master Data Management.
The W3C standard for Web privacy is called:
Platform for Privacy Preferences.
________ is used to undo unwanted database changes.
Rollback
Which of the following characterizes homogeneous environments?
Same DBMS used at all locations
Which of the following is a principal type of authorization table?
Subject
Which of the following is a basic method for single field transformation?
Table lookup
TQM stands for:
Total Quality Management.
Which of the following is NOT an area of concern when trying to maintain a well-tuned database?
User interface design
Snapshot replication is most appropriate for
a data warehouse application.
An open-source DBMS is:
a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
The process of transforming data from a detailed to a summary level is called:
aggregating
While views promote security by restricting user access to data, they are not adequate security measures because:
an unauthorized person may gain access to a view through experimentation.
Which of the following is a type of network security:
authentication of the client workstation.
Controls designed to restrict access and activities are called:
authorization rules.
The preferred method of fixing an aborted transaction is:
backing out the transaction.
A device to measure or detect fingerprints or signatures is called a(n) ________ device.
biometric
One way to improve the data capture process is to:
check entered data immediately for quality against data in the database
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:
checkpoint facility.
A characteristic of reconciled data that means the data reflect an enterprise-wide view is:
comprehensive
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.
concurrency control
A design goal for distributed databases that states that although a distributed database runs many transactions, it appears that a given transaction is the only one in the system is called: A) linear run.
concurrency transparency.
All of the following are tasks of data cleansing EXCEPT:
creating foreign keys.
Data quality problems can cascade when:
data are copied from legacy systems.
Conformance means that:
data are stored, exchanged or presented in a format that is specified by its metadata.
A repository of information about a database that documents data elements of a database is called a:
data dictionary
Including data capture controls (i.e., dropdown lists) helps reduce ________ deteriorated data problems.
data entry
All of the following are ways to consolidate data EXCEPT:__
data rollup and integration.
A technique using artificial intelligence to upgrade the quality of raw data is called:
data scrubbing
A technique using pattern recognition to upgrade the quality of raw data is called:
data scrubbing.
Converting data from the format of its source to the format of its destination is called:
data transformation.
A(n) ________ is a database stored on multiple computers in multiple locations that are NOT connected by a data communications link.
decentralized database
) An integrated partition strategy is ________ to manage.
difficult
A ________ allows a single SQL statement to refer to tables in more than one remote DBMS.
distributed request
All of the following are advantages of vertical partitioning EXCEPT
easier to set up than horizontal partitioning.
A synchronized replication strategy has a(n) ________ reliability.
excellent
A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked.
exclusive lock
Datatype conflicts is an example of a(n) ________ reason for deteriorated data quality.
external data source.
Getting poor data from a supplier is a(n) ________ reason for deteriorated data quality.
external data source.
With ________ all of the actions of a transaction are either committed or not committed.
failure transparency
Loading data into a data warehouse does NOT involve:
formatting the hard drive.
) In a distributed database, a transaction that requires reference to data at one or more nonlocal sites is called a ________ transaction.
global
Data governance can be defined as:
high-level organizational groups and processes that oversee data stewardship.
Data that are accurate, consistent, and available in a timely fashion are considered:
high-quality.
The best place to improve data entry across all applications is:
in the database definitions.
A method of capturing only the changes that have occurred in the source data since the last capture is called ________ extract.
incremental
Data quality is important for all of the following reasons EXCEPT:
it provides a stream of profit.
The process of combining data from various sources into a single table or view is called:
joining
An audit trail of database changes is kept by a:
journalizing facility
An optimization strategy that allows sites that can update to proceed and other sites to catch up is called
lazy commit.
Informational and operational data differ in all of the following ways EXCEPT:
level of detail.
With ________, users can act as if all the data were located at a single node.
location transparency
The extent of the database resource that is included with each lock is called the level of:
lock granularity
In the ________ approach, one consolidated record is maintained from which all applications draw data.
persistent
In the ________ approach, one consolidated record is maintained, and all applications draw on that one actual "golden" record.
persistent
Data federation is a technique which:
provides a virtual view of integrated data without actually creating one centralized database.
Event-driven propagation:
pushes data to duplicate sites as an event occurs.
The major advantage of data propagation is
real-time cascading of data changes throughout the organization.
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.
recovery manager
All of the following are disadvantages of data replication EXCEPT:
reduced network traffic at prime time.
An approach to filling a data warehouse that employs bulk rewriting of the target data periodically is called:
refresh mode.
A design goal for distributed databases to allow programmers to treat a data item replicated at several sites as though it were at one site is called:
replication transparency
Data quality ROI stands for:
risk of incarceration.
Guidelines for server security should include all of the following EXCEPT:
securing the network between client and server.
A joining operation in which only the joining attribute from one site is transmitted to the other site is called a(n):
semijoin.
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process and output electronic data in a secure manner is called a(n):
smart card.
One simple task of a data quality audit is to:
statistically profile all files.
With a pull strategy of replication, the ________ node determines when a database is updated.
target
Security measures for dynamic Web pages are different from static HTML pages because:
the connection requires full access to the database for dynamic pages.
External data sources present problems for data quality because:
there is a lack of control over data quality.
One characteristic of quality data which pertains to the expectation for the time between when data are expected and when they are available for use is:
timeliness
A discrete unit of work that must be processed completely or not at all within a computer system is called a
transaction.
Forward recovery is faster than restore/rerun because
transactions do not have to be repeated.
One way to generate store and forward messages for completed transactions to be broadcast across a network is through the use of:
triggers
A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.
two-phase lock
Quality data can be defined as being:
unique
The sequence of instructions required to process a transaction is called the:
unit of work.
User interaction integration is achieved by creating fewer ________ that feed different systems.
user interfaces
An optimistic approach to concurrency control is called:
versioning.
Replication should be used when:
when there are no or few triggers.