Ch 8 for mergin
A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager. T/F
F
A default value is the value that a field will always assume, regardless of what the user enters for an instance of that field. T/F
F
A domain is a way to create a structure that acts like a table. T/F
F
A file organization is a named portion of primary memory. T/F
F
A join index is a combination of two or more indexes. T/F
F
ACID support for database-as-a-service is easily provided in a cloud computing environment. T/F
F
An extent is a named portion of secondary memory allocated for the purpose of storing physical records. T/F
F
Backward recovery starts with an earlier copy of the database. T/F
F
Controls incorporated into a data management system that restrict access to data are called authentication rules. T/F
F
Denormalization is the process of transforming relations with variable-length fields into those with fixed-length fields. T/F
F
Free range partitioning is a type of horizontal partitioning in which each partition is defined by a range of values for one or more columns in the normalized table. T/F
F
Horizontal partitioning refers to the process of combining several smaller relations into a larger table. T/F
F
In order to perform a restore/rerun, the database must be mirrored. T/F
F
Loss of data integrity does not impact the quality of data in a database. T/F
F
One method to handle missing values is to substitute an exact value. T/F
F
Parallel query processing speed is not significantly different from running queries in a non-parallel mode. T/F
F
Reduced uptime is a disadvantage of partitioning. T/F
F
The Number datatype would be appropriate for a zip code. T/F
F
The logical database design always forms the best foundation for grouping attributes in the physical design. T/F
F
The restoration manager allows the DBMS to restore the database to a correct condition and restart processing transactions. T/F
F
Three-factor authentication is most often implemented with a credit card. T/F
F
Unlimited bandwidth is a characteristic of cloud computing. T/F
F
Using an index for attributes referenced in ORDER BY and GROUP BY clauses has no significant impact upon database performance. T/F
F
A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes. T/F
T
A checkpoint facility is a facility by which the DBMS refuses to accept any new transactions. T/F
T
A hashing algorithm is a routine that converts a primary key value into a relative record address. T/F
T
A key component of the Sarbanes-Oxley Act was enacted to ensure the integrity of IT infrastructure in use within an organization. T/F
T
A pointer is a field of data that can be used to locate a related field or record of data. T/F
T
A tablespace is a named set of disk storage elements in which physical files for the database tables may be stored. T/F
T
A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day. T/F
T
A view can be built to present only the data to which a user requires access. T/F
T
Along with table scans, other elements of a query can be processed in parallel. T/F
T
An audit trail of transactions and database changes is kept by a journalizing facility T/F
T
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data. T/F
T
Denormalization almost always leads to more storage space for raw data. T/F
T
Examination and modification of the SQL code in an application may lead to performance improvements. T/F
T
Fast data retrieval is one factor to consider when choosing a file organization for a particular database file. T/F
T
Hash partitioning spreads data evenly across partitions independent of any partition key value. T/F
T
In a Heap file organization, files are not stored in any particular order. T/F
T
Keeping the zip code with the city and state in a table is a typical form of denormalization. t/f
T
Live migration from one environment to another in cloud computing is a challenge. T/F
T
One objective of selecting a data type is to minimize storage space. T/F
T
Platform-as-a-service is an approach for providing infrastructure resources and tools for developers to be productive. T/F
T
Security is one advantage of partitioning. T/F
T
Sensitivity testing involves ignoring missing data unless knowing a value might significantly change results. T/F
T
The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme. T/F
T
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access. T/F
T
The restore/rerun technique involves reprocessing the day's transactions against the backup copy of the database. T/F
T
VarChar2 would be appropriate for a user that wanted a text datatype for LastName that would only consume the required space. T/F
T
With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data. T/F
T
n a sequential file, the records are stored in sequence according to a primary key value. T/F
T
Correct installation of the DBMS product is essential to any environment.
True
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a: checkpoint facility. database change log. backup facility. recovery manager.
a
A cloud computing approach in which the service consists mainly of hardware and systems software resources is called: Infrastructure-as-a-service. IDE. Software-as-a-service. Platform-as-a-service
a
A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a: hash index table. hash key. multi-indexed file organization. hashed file organization.
a
A key decision in the physical design process is: selecting structures. deciding on the monitor. deciding the e-r diagrams. ignoring the size of the database.
a
All of the following are advantages to cloud-based computing EXCEPT: ACID support for database as a service. elasticity. organizations can explore new data management technologies more easily no need for initial investment in hardware, physical facilities and systems software.
a
All of the following are disadvantages to cloud-based computing EXCEPT: the visibility of costs of data management is better. DBaaS is still struggling to provide ACID properties of databases. live migration from one environment to another is a challenge. the promise of elasticity is not fulfilled because the model will not adapt to changing requirements.
a
All of the following are valid datatypes in Oracle 12c EXCEPT: BOOLEAN. BLOB. VARCHAR2. NUMBER.
a
An audit trail of transactions and database changes is kept by a ________. journalizing facility. before image. change control device. subschema
a
Designing physical files requires ________ of where and when data are used in various ways. descriptions maps keys hints
a
Distributing the rows of data into separate files is called: horizontal partitioning. file allocation. vertical partitioning. normalization
a
One field or combination of fields for which more than one record may have the same combination of values is called a(n): secondary key linked key composite key index
a
Sarbanes-Oxley Act was enacted to ensure the integrity of: public companies' financial statements. SQL. Entity-Relationship Diagrams. private companies' shareholders meetings.
a
The smallest unit of application data recognized by system software is a: field. column. data type. row
a
Which of the following is an objective of selecting a data type? Improve data integrity Maximize storage space Limit security Represent a small number of possible values
a
Which of the following is an objective of selecting a data type? Improve data integrity Limit security Represent a small number of possible values Maximize storage space
a
While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the: operating system. XML. user. CEO.
a
A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called: Platform-as-a-service. Software-as-a-service. Soft-computing-service. Infrastructure-as-a-service.
b
A detailed coding scheme recognized by system software for representing organizational data is called a(n): DBMS code. data type. SQL. DB layout.
b
A device to measure or detect fingerprints or signatures is called a(n) ________ device. ink biometric laser view
b
A disadvantage of partitioning is: remote optimization. extra space and update time. shorter technology spans. simplicity.
b
A discrete unit of work that must be processed completely or not at all in a computer system is called a(n) ________. journalizing facility. transaction. change control device. before image.
b
A factor to consider when choosing a file organization is: DDL. efficient storage. inefficient data retrieval. DML.
b
A file organization where files are not stored in any particular order is considered a: hash key. heap file organization. multi-indexed file organization. hashed file organization.
b
A method for handling missing data is to: delete the associated row. track missing data with special reports. perform insensitivity testing. substitute with random numbers for the missing data.
b
A(n) ________ is a field of data used to locate a related field or record. lock pointer index key
b
All of the following are common denormalization opportunities EXCEPT: reference data. a one-to-many relationship. two entities with a one-to-one relationship. a many-to-many relationship with nonkey attributes.
b
In which type of file is multiple key retrieval not possible? Indexed Hashed Clustered Sequential
b
When incorrect data have been introduced, the database is best recovered by: starting with a new ERD. restarting from the most recent checkpoint and processing subsequent transactions. reloading RDMS software. formatting server.
b
Which type of file is easiest to update? Clustered Hashed Sequential Indexed
b
________ partitioning distributes the columns of a table into several separate physical records. Horizontal Vertical Crossways Final
b
A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers, and join tables to prepare query results is the: explain query. show optimization. explain plan. analyze query.
c
A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called: query optimization. perpendicular query processing. parallel query processing. multiple partition queries
c
A trigger can be used as a security measure in which of the following ways? To conduct a DFD analysis To check for viruses To cause special handling procedures to be executed To design a database
c
An appropriate datatype for adding a sound clip would be: CHAR. DATE. BLOB. VARCHAR
c
An index on columns from two or more tables that come from the same domain of values is called a: bitmap index. transaction index. join index. multivalued index
c
An integrity control supported by a DBMS is: GUI guards. security. range control. substitute estimates.
c
Arequirement to begin designing physical files and databases is: implementation complete. all datatypes determined. normalized relations. physical tables created.
c
Controls designed to restrict access and activities are called: business rules. schemas. authorization rules. encryption controls.
c
Forward recovery is faster than restore/rerun because: images are mirrored. security can be avoided. transactions do not have to be repeated. systems are more complete.
c
The coding or scrambling of data so that humans cannot read them is called ________. hiding. encoding. encryption. demarcation.
c
The preferred method of fixing an aborted transaction is: repairing the schema. switching. backing out the transaction. duplication of data.
c
Which type of file is most efficient with storage space? Indexed Hashed Sequential Clustered
c
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs. restart facility backup facility transaction logger recovery manager
d
A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called: Tools-as-a-service. Software-as-a-service. Infrastructure-as-a-service. Platform-as-a-service.
d
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process, and output electronic data in a secure manner is called a(n): smart chip. secure card. e-credit card. smart card
d
A form of denormalization where the same data are purposely stored in multiple places in the database is called: horizontal partitioning. advanced placement. data duplication. data replication.
d
A method to allow adjacent secondary memory space to contain rows from several tables is called: compiling. cluttering. concatenating. clustering.
d
A transaction that terminates abnormally is called a(n) ________ transaction. terminated deleted completed aborted
d
All of the following are objectives when selecting a data type EXCEPT: support all data manipulations. represent all possible values. improve data integrity. use a lot of storage space.
d
An advantage of partitioning is: extra space and update time. increase redundancy. remote optimization. efficiency.
d
An audit trail of database changes is kept by a: subschema. change control device. before image. journalizing facility.
d
Horizontal partitioning makes sense: when less security is needed. when only one category is allowed. when partitions must be organized the same. when different categories of a table's rows are processed separately.
d
Sensitivity testing involves: deleting the associated row. seeing how accurate data are. checking to see if your teeth hurt when you brush. checking to see if missing data will greatly impact results.
d
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. programmer productivity query design data integration data integrity
d
The value a field will assume unless the user enters an explicit value for an instance of that field is called a: range control. gurand. null value default value
d
Which of the following threats involves outside parties using information to embarrass a company? Loss of data integrity Theft and fraud Accidental loss loss of confidelity
d
Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n): table. partition. extent. tablespace
d
________ is used to undo unwanted database changes. Rollforward Encryption Restart Rollback
d
One decision in the physical design process is selecting structures. T/F
t