Chapter 16 Database Management, ch 13 4620

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In the context of the advancements in DBMS technology, the use of ___ data services can free the DBA from many lower-level technology-oriented tasks.

ANSWER: cloud

The DBA must review the database application design to ensure that transactions are ___, meaning that they mirror real-world events.

ANSWER: correct

The ___, also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap.

ANSWER: data administrator

A(n) ___ physically stores the database's data.

ANSWER: data file

In the context of data quality management tools, ___ software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.

ANSWER: data-profiling

The DSO's activities are often classified as ___ management, which includes all DBA activities designed to ensure data availability following a physical calamity or a database integrity failure.

ANSWER: disaster

In the context of ensuring integrity of a database, a(n) ___ transaction is one that does not overload the DBMS.

ANSWER: efficient

Within the data security framework, ___ is concerned with keeping data consistent and free of errors or anomalies.

ANSWER: integrity

In the context of an organization's managerial structure, ___ decisions are short term and affect only daily operations; for example, deciding to change the price of a product to clear it from inventory.

ANSWER: operational

In the context of database administration, ___ is the extent to which individuals and organizations have the right to determine the "who, what, when, where, and how" of data usage.

ANSWER: privacy

Based on the type of decision-making support required, database users may be classified into: operational, tactical, or ___.

ANSWER: strategic

In case a company installs several incompatible databases and assigns a DBA for each of them, the general coordinator of all such DBAs is known as the ___ administrator.

ANSWER: systems

The ___ aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization.

ANSWER: technological

Performance monitoring and ___ activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels.

ANSWER: tuning

A security ___ is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

ANSWER: vulnerability

___ CASE tools provide support for the coding and implementation phases.

Back-end

___ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

Confidentiality

___ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

Corrupting

Database administration operations are commonly defined and divided according to the phases of the ___

DBLC

Which of the following is a reason why a DBMS's daily operations must be clearly documented?

Documentation of the daily operations help pinpoint causes and solutions of database problems.

A data store is used by data analyst to create queries that access the database.

False

A data warehouse designer must define common business dimensions that will be used by a data analyst to narrow a search, group information, or describe attributes.

False

A passive data dictionary is one that is updated automatically with every database access to keep its access information up to date.

False

A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

False

By default, the fact table's primary key is always formed by combining the superkeys pointing to the dimension tables to which they are related.

False

Data warehouse data are organized and summarized by table, such as CUSTOMER and ADDRESS

False

Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure.

False

Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.

False

In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity.

False

In the context of database security measures, enforcing complex password policies will address the security vulnerabilities of the operating system component.

False

Incremental backups produce a backup of all data.

False

Master data management's main goal is to provide a partial and segmented definition of all data within an organization

False

Normalizing fact tables improves data access performance and saves data storage space.

False

Operational data and decision support data serve the same purpose.

False

Queries against operational data typically are broad in scope and high in complexity.

False

Relational data warehouses use multidimensional data schema support to handle multidimensional data

False

The CUBE extension enable you to get a grand total for each column listed in the expression

False

The ROLLUP extension is used with the GROUP BY clause to generate aggregates by the listed columns, including the last one.

False

The security, privacy, and integrity of data in a database are of minimal concern to DBAs who manage current DBMS installations.

False

Training people to use the DBMS and its tools is not included in the responsibilities of a DBA.

False

When an organization employs both a DA and a DBA, the DA's job has a technical orientation, whereas the DBA's job has a managerial orientation.

False

___ CASE tools provide support for the planning, analysis, and design phases.

Front-end

___ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.

Information engineering (IE)

In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions in an organization's:

Lower levels

___ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.

Standards

___ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.

System support

A full backup, or database dump, produces a complete copy of the entire database.

True

A star schema is designed to optimize data query operations rather than data update operations.

True

Advanced OLAP feature become more useful when access to them is kept simple.

True

An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.

True

Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database.

True

Business Intelligence (BI) architecture is composed of data, people, processes, technology, and the management of such components.

True

Business intelligence is a framework that allows a business transform data into information, information into knowledge, and knowledge into wisdom.

True

Concurrent backups take place while the user is working on the database.

True

Decision support data are a a snapshot of the operational data at a given point in time.

True

Multidimensional data analysis techniques include advanced advanced computational functions.

True

Periodicity, usually expressed as current year only, previous years, or all years, provides information about the time span of the data stored in a table.

True

Protecting the security and integrity of a database is a function of authorization management.

True

ROLAP and MOLAP vendors are working toward the integration of their respective solutions within a unified decision support framework.

True

Security breaches can yield a database whose integrity is either preserved or corrupted.

True

System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.

True

Testing procedures and standards must already be in place before any application program can be approved for use in the company.

True

The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.

True

The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department.

True

The DBA interacts with the end user by providing data and information support services to the organization's departments.

True

The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.

True

The DBA must supervise the installation of all software and hardware designated to support the data administration strategy.

True

The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.

True

The DBMS must provide tools that give each level of management a useful view of the data and support the required level of decision-making.

True

The data warehouse development life cycle differs from classical systems development

True

The data warehouse development life cycle differs from classical systems development.

True

The introduction of a DBMS represents a big change and challenge and is likely to have a profound impact throughout the organization.

True

The maintenance activities of the DBA are an extension of the operational activities.

True

The storage locations for multiple backups must include sites inside and outside the organization.

True

To provide better performance, some OLAP systems merge data warehouse and data mart approaches by storing small extracts of the data warehouse at end-user workstations.

True

When performing user access management, a DBA assigns passwords to each user at both the operating system and DBMS levels.

True

A(n) ___ plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time.

access

A(n) ___ data dictionary is automatically updated by the DBMS with every database access.

active

The person responsible for the control of the centralized and shared database is the database ___

administrator

In the context of database usage monitoring, a(n) ___ is a file that automatically records a brief description of the database operations performed by all users.

audit log

User-access management is a subset of ___

authorization management

When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) ___ impact of the new database system.

cultural

The ___ administrator is responsible for strategic planning.

data

In the context of data backup and recovery, the activities of a ___ includes the DBA operations that are classified as disaster management.

database security officer

A data administrator is also known as a(n) ___

information resource manager

In the context of developing a data administration strategy, a(n) ___ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools.

information systems architecture

One of the important functions provided by the database ___ is to reserve the resources that must be used by the database at run time.

initialization parameters

Coordinating, monitoring, and allocating database administration resources is included in a DBA's ___ role.

managerial

When performing user access management, a DBA defines each user to the database at the ___ levels.

operating system and DBMS

A(n) ___ data dictionary is not updated automatically and usually requires a batch process to be run.

passive

"All users must have passwords" is an example of a ___

policy

Instructions to create a password are an example of a ___

procedure

In the context of the Oracle Enterprise Manager, a ___ is a named collection of settings that control how much of the database resource a given user can use.

profile

At the level of middle management, the database must be able to ___

provide the data necessary for tactical decisions and planning

In the context of the Oracle Enterprise Manager, a(n) ___ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.

role

The ___ component of a CASE tool produces the information system's input/output formats.

screen painter and report generator

A password must have a minimum of five characters" is an example of a ___

standard

A(n) ___ is a logical storage area in Oracle.

tablespace

In the context of the Oracle Enterprise Manager, a(n) ___ is a uniquely identifiable object that allows a given person to log on to the database.

user


Set pelajaran terkait

Russian Revolution Vocabulary Quiz (Ch. 11/Sec. 5)

View Set

Florida Statutes, Rules, And Regulations Common To All Lines

View Set

Business Law 1 Final Preparation Chapter 19 - Title to Goods and Risk of Loss

View Set

Chapter 11 - Childhood Development

View Set

abdominal vasculature PRACTICE QUIZ

View Set

Nongovernmental Organizations (NGOs)

View Set