Final Review/ PARTS 4-6
An organization should have one data warehouse administrator for every:
100 gigabytes of data in the enterprise data warehouse.
A data warehouse administrator has which of the following responsibilities?
All of the above
A trigger can be used as a security measure in which of the following ways? a. b. c. d. all of the above
All of the above
An information repository supplies information to: a. users b. automated CASE tools c. database management systems d. all of the above
All of the above
Which of the following is a type of network security?
Authentication of the client workstation
Which of the following functions model business rules?
Database analysis
Loss of data integrity does not impact the quality of data in a database.
FALSE
Open-source software always comes with complete documentation.
FALSE
Quality data does not have to be unique
FALSE
Replicated databases usually result in tightly coupled nodes.
FALSE
Retention refers to the amount of data that is not purged periodically from tables.
FALSE
Specifications for transactions do not need to be reviewed quickly.
FALSE
Total Quality Management (TQM) focuses on defect correction rather than defect prevention.
FALSE
Users of distributed database systems always need to know the location of the data.
FALSE
In the ________ approach, one consolidated record is maintained, and all applications draw on that one actual "golden" record.
Federated
The methods to ensure the quality of data across various subject areas are called:
Master Data Management.
The W3C standard for Web privacy is called:
Platform for Privacy Preferences
Which of the following characterizes homogeneous environments?
Same DBMS in all locations
A data quality audit helps an organization understand the extent and nature of data quality problems.
TRUE
The best place to improve data entry across all applications is:
The database definitions
Snapshot replication is most appropriate for
a data warehouse application
An open-source DBMS is:
a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
A distributed database must: a. keep track of data locations b. present a single logical database that is physically distributed c. provide consistency among data copies d. all of the above
all of the above
High-quality data are data that are: a. b. c. d. all of the above
all of the above
Which of the following are factors in deciding on database distribution strategies? a. organizational forces b. frequency of data access c. reliability needs d. all of the above
all of the above
While views promote security by restricting user access to data, they are not adequate security measures because:
an unauthorized person may gain access to a view through experimentation.
Controls designed to restrict access and activities are called:
authorization rules.
A(n) ______ is a database stored on multiple computers in multiple locations that are NOT connected by a data communications link. a. distributed database b. decentralized database c. unlinked database d. data repository
b. decentralized database
One way to improve the data capture process is to:
check entered data immediately for quality against data in the database.
Which of the following are business conditions that encourage the use of distributed databases? a. Business unit autonomy b. data sharing needs c. data communication reliability d. all of the above
d. All of the above
Data quality problems can cascade when:
data are copied from legacy systems.
Conformance means that:
data are stored, exchanged or presented in a format that is specified by its metadata.
An integrated partition strategy is ________ to manage.
difficult
All of the following are advantages of vertical partitioning EXCEPT:
easier to setup than horizontal partitioning
A synchronized replication strategy has a(n) ________ reliability.
excellent
In a distributed database, a transaction that requires reference to data at one or more nonlocal sites is called a ________ transaction.
global
Data governance can be defined as:
high-level organizational groups and processes that oversee data stewardship.
With ________, users can act as if all the data were located at a single node.
location transparency
All of the following are popular architectures for Master Data Management EXCEPT:
normalization
A centralized strategy has ________ expandability.
poor
All of the following are disadvantages of data replication EXCEPT:
reduced network traffic at prime time.
A design goal for distributed databases to allow programmers to treat a data item replicated at several sites as though it were at one site is called:
replication transparency
Data quality ROI stands for:
return of investment
Guidelines for server security should include all of the following EXCEPT:
securing the network between client and server.
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process and output electronic data in a secure manner is called a(n):
smart card
One simple task of a data quality audit is to:
statistically profit all files
With a pull strategy of replication, the ________ node determines when a database is updated.
target
Security measures for dynamic Web pages are different from static HTML pages because:
the connection requires full access to the database for dynamic pages.
A distributed database may require more costly and complex software than a centralized database.
TRUE
Which of the following are key steps in a data quality program? a. b. c. d. all of the above
All of the above
Which of the following is an advantage to data replication? a. reliability b. fast response c. node decoupling d. all of the above
All of the above
Which of the following is true of data replication? a. additional storage requirements b. faster response c. node decoupling d. all of the above
All of the above
Which of the following is true of poor data and/or database administration? a. data timing problems b. multiple entry definitions c. unknown meanings of stored data d. all of the above
All of the above
Which of the following is true of distributed databases?
Better local control
A device to measure or detect fingerprints or signatures is called a(n) ________ device.
Biometric
Which of the following is true about horizontal partitioning?
Data can be stored to optimize local access.
________ is a technical function responsible for database design, security, and disaster recovery.
Database administration
Which of the following functions develop integrity controls?
Database design
Which of the following functions do cost/benefit models?
Database planning
A data governance committee is always made up of high-ranking government officials.
FALSE
A data stewardship program does not help to involve the organization in data quality.
FALSE
A domain is a way to create a structure that acts like a table.
FALSE
Applications that can tolerate out-of-date data are not the best candidates for data replication.
FALSE
Data which arrive via XML and B2B channels is always guaranteed to be accurate
FALSE
Databases are generally the property of a single department within an organization.
FALSE
Dirty data saves work for information systems projects.
FALSE
Distributed databases do not easily satisfy both transaction and analytical processing systems.
FALSE
Generally, records in a customer file never become obsolete.
FALSE
Local autonomy means that data are not accessible from remote sites.
FALSE
Shared ownership of data is most appropriate as business activities move across time zones.
FALSE
With an asynchronous distributed database, all data across the network is continuously kept up to date.
FALSE
Which of the following supports a simple path to other databases, without the benefits of one logical database?
Gateways
Which of the following environments uses a different DBMS at each node and supports local databases for unique data request
Heterogeneous; federated
Which of the following environments uses the same DBMS at each node with a central or master DBMS coordinating database access across nodes?
Homogeneous; nonautonomous
Data quality is important for all of the following reasons EXCEPT
It provides a stream of profit
________ is a design goal for a distributed database, which says a user does not need to know the location of data to use the data.
Location transparency
Which of the following threats involves outside parties using information to embarrass a company?
Loss of confidentiality
Which of the following is a principal type of authorization table?
Subject
A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.
TRUE
A view can be built to present only the data to which a user requires access.
TRUE
Applications such as decision support or data warehousing often do not require current data and are supported by periodic snapshots.
TRUE
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data
TRUE
Completeness means that all data that are needed are present
TRUE
Data quality is essential for SOX and Basel II compliance.
TRUE
Horizontal partitioning offers increased efficiency because data are close to use areas.
TRUE
In a heterogeneous environment, not all users use the same DBMS.
TRUE
In a homogeneous environment, the same DBMS is used at each location.
TRUE
One way to generate messages for near-real-time replication is through the use of database triggers.
TRUE
Replication is often used for noncollaborative data.
TRUE
Replication should NOT be used if timely updates are important.
TRUE
The data administrator takes responsibility for the overall management of data resources.
TRUE
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
TRUE
The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.
TRUE
The role of database administration is typically a more hands-on, physical involvement with the management of databases.
TRUE
The uncontrolled proliferation of spreadsheets, databases and repositories leads to data quality problems.
TRUE
Replication should be used when:
there are no or few triggers
External data sources present problems for data quality because:
there is a lack of control over data quality
One characteristic of quality data which pertains to the expectation for the time between when data are expected and when they are available for use is:
timeless
TQM stands for:
total quality management
One way to generate store and forward messages for completed transactions to be broadcast across a network is through the use of:
triggers
Quality data can be defined as being:
unique