chapter 11
An organization should have one data warehouse administrator for every
100 gigabytes of data in the enterprise data warehouse.
Which of the following is not a component of a repository system architecture?
A data transformation process
A data warehouse administrator has which of the following responsibilities?
A data warehouse administrator has which of the following responsibilities?
1) Which of the following is true of poor data and/or database administration?
All of the above
A trigger can be used as a security measure in which of the following ways?
All of the above
Which of the following characteristics is required of a data administration manager?
All of the above
Which of the following functions are supported by a repository engine?
All of the above
Which of the following skills are required of a database administrator?
All of the above
________ is a technical function responsible for database design, security, and disaster recovery.
Database administration
Which of the following functions model business rules?
Database analysis
Which of the following functions develop integrity controls?
Database design
Which of the following functions do cost/benefit models?
Database planning
A(n) ________ is submitted by a DBA to test the current performance of a database or predict the response time for queries.
Heartbeat query
Which of the following threats involves outside parties using information to embarrass a company?
Loss of confidentiality
The W3C standard for Web privacy is called:
Platform for Privacy Preferences.
________ is used to undo unwanted database changes.
Rollback
Which of the following is a principal type of authorization table?
Subject
Which of the following is NOT an area of concern when trying to maintain a well-tuned database?
User interface design
An open-source DBMS is:
a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
An information repository supplies information to:
all of the above.
When incorrect data have been introduced, the database is best recovered by:
all of the above.
While views promote security by restricting user access to data, they are not adequate security measures because:
an unauthorized person may gain access to a view through experimentation.
Which of the following is a type of network security:
authentication of the client workstation.
Controls designed to restrict access and activities are called:
authorization rules.
The preferred method of fixing an aborted transaction is:
backing out the transaction.
A device to measure or detect fingerprints or signatures is called a(n) ________ device.
biometric
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:
checkpoint facility.
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.
concurrency control
A repository of information about a database that documents data elements of a database is called a:
data dictionary
A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked.
exclusive lock
A(n) ________ stores metadata about an organization's data and data processing resources.
information repository
An audit trail of database changes is kept by a:
journalizing facility
The extent of the database resource that is included with each lock is called the level of:
lock granularity
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.
recovery manager
Guidelines for server security should include all of the following EXCEPT:
securing the network between client and server.
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process and output electronic data in a secure manner is called a(n):
smart card.
Security measures for dynamic Web pages are different from static HTML pages because:
the connection requires full access to the database for dynamic pages.
A discrete unit of work that must be processed completely or not at all within a computer system is called a
transaction.
Forward recovery is faster than restore/rerun because
transactions do not have to be repeated.
A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.
two-phase lock
An optimistic approach to concurrency control is called:
versioning.