Quiz 4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

________ is a technical function responsible for database design, security, and disaster recovery. Data administration Database administration Tech support Operations

Database administration

Which of the following functions develop integrity controls? Database planning Database analysis Database implementation Database design

Database design

In MySQL workbench, Views are generally stored under tables. T F

F

Oracle is an example of open-source DBMS True False

False

Which of the following MySQL commands is used to recover a transaction? REVOKE DROP GRANT ROLLBACK

ROLLBACK

A business analyst has the privilege to view and update a particular schema. Which of the following SQL statements will change privileges such that he/she cannot update anymore? Drop user businessanalyst@localhost Delete update privilege on schema Withdraw update privilege from businessanalyst@localhost Revoke update on schema from businessanalyst@localhost

Revoke update on schema from businessanalyst@localhost

A deadlock results when two or more transactions need a common resource, but neither can proceed until the other releases the resource it wants. T F

T

According to a 2017 study in MIT Sloan Management review, data quality issues cost companies 15%-25% of their revenue. T F

T

Lack of organizational commitment is a potential reason for organizations deteriorated data quality. T F

T

The default value of autocommit in MySQL is 1 T F

T

The following scenario represents a case in which a concurrency control mechanism is needed. https://docs.google.com/document/d/12_iiUK8z8yovnQPj-HOToLFmUXkiUDZ0ToisZ2eBKQw/edit T F

T

Views can be used to improve database security. T F

T

An open-source DBMS is: a free source-code RBMS that provides the functionality of an SQL-compliant DBMS. a beta release of a commercial RDBMS. an object-oriented database management system. source code for a commercial RDBMS.

a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.

A device to measure or detect fingerprints or signatures is called a(n) ________ device. biometric view ink laser

biometric

The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions. logging concurrency control transaction authorization multiple management

concurrency control

Including data capture controls (i.e., dropdown lists) helps reduce ________ deteriorated data problems. external data source inconsistent metadata data entry lack of organizational commitment

data entry

Converting data from the format of its source to the format of its destination is called: data transformation. data loading. data scrubbing. data storage.

data transformation.

The coding or scrambling of data so that humans cannot read them is called: demarcation. hiding. encoding. encryption.

encryption.

Getting poor data from a supplier is a(n) ________ reason for deteriorated data quality. external data source inconsistent metadata data entry problem lack of organizational commitment

external data source

Data governance can be defined as: a means to slow down the speed of data. high-level organizational groups and processes that oversee data stewardship. a government task force for defining data quality. a means to increase the speed of data.

high-level organizational groups and processes that oversee data stewardship.


संबंधित स्टडी सेट्स

SOCWK 6630 Quiz 2 - Diagnosis and Related Treatment for Social Work Practice

View Set

Experience Human Development Chapter 5

View Set

DC theory level 1 second edition lesson 4 conductor resistance and wattage loss

View Set

Chapter 1 Introduction to Nursing

View Set

12-1 Assignment: Radical Reconstruction

View Set

11. Circle Review (Parts, Circumference, Area, Circumference Backwards, Circumference→Area)

View Set