ITD 256 Chapter 11 Self Check

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

F

"T/F Databases are generally the property of a single department within an organization.

Heartbeat Query

A ________ is a query submitted by a DBA to test the current performance of a database or to predict the response time for queries.

biometric device

A ________ measures or detects personal characteristics such as fingerprints.

transaction

A discrete unit of work that must be processed completely or not at all in a computer system is called a(n) ________.

data administration

A high-level function that is responsible for the overall management of data resources in an organization is called ________.

aborted

A transaction that terminates abnormally is called a(n) ________ transaction.

information repository

A(n) ________ is a component that stores metadata.

checkpoint facility

A(n) ________ is a facility by which the DBMS refuses to accept any new transactions.

deadlock

A(n) ________ is an impasse that results when two or more transactions have locked a common resource, and each waits for the other to unlock that resource.

journalizing facility

An audit trail of transactions and database changes is kept by a ________.

Locked

Any data that are retrieved by a user for updating must be ________ until the update is completed or aborted.

authorization rules

Controls incorporated into a data management system that restrict access to data are called ________.

free DBMS source code

Open-source DBMS are ________ software that provides the core functionality of an SQL compliant DBMS.

versioning

Optimistic concurrency control, or ________, restricts each transaction to a view of the database as of the time that the transaction was started.

database implementation

Specifying database access policies is done during the ________ phase.

T

T/F A DBMS may perform checkpoints automatically or in response to commands in user application programs.

T

T/F A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes.

T

T/F A business transaction is a sequence of steps that constitute some well-defined business activity

F

T/F A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager.

F

T/F A deadlock results when two transactions try to read the same record

F

T/F A domain is a way to create a structure that acts like a table.

F

T/F A repository of information about data is called a catalog.

T

T/F A shared lock allows other transactions to read but not update records in use.

T

T/F A typical cause of database destruction is a disk crash.

T

T/F A view can be built to present only the data to which a user requires access.

F

T/F Allocating 10 percent over suggested installation space is sufficient for a DBMS.

T

T/F Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.

F

T/F Backward recovery starts with an earlier copy of the database.

T

T/F CASE tool-generated information should be fed into repositories.

T

T/F Concurrent transactions need to be processed in isolation so that they do not interfere with each other.

F

T/F Database applications are not very disk intensive.

T

T/F Examination and modification of the SQL code in an application may lead to performance improvements.

F

T/F Field-level locks are used quite often.

F

T/F In order to perform a restore/rerun, the database must be mirrored.

F

T/F Loss of data integrity does not impact the quality of data in a database.

F

T/F Open-source software always comes with complete documentation.

F

T/F Specifications for transactions do not need to be reviewed quickly.

F

T/F The Information Resource Lexicon System (IRLS) is a computer software tool used to manage and control access to the information repository.

T

T/F The data administrator takes responsibility for the overall management of data resources.

T

T/F The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme.

T

T/F The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.

F

T/F The granularity of locking is not a critical decision in database design.

T

T/F The repository information model defines types, which should be easy to extend.

T

T/F The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.

T

T/F The role of database administration is typically a more hands-on, physical involvement with the management of databases.

F

T/F The transaction log contains before- and after-images of records that have been modified.

F

T/F There are two principal types of authorization tables: one for subjects and one for facts.

F

T/F Three-factor authentication is most often implemented with a credit card.

T

T/F Two-phase locking results in a growing phase where locks are acquired and a shrinking phase where locks are released.

F

T/F Versioning takes the pessimistic approach to locking.

T

T/F With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.

T

T/F installation of the DBMS product is essential to any environment.

recovery manager

The ________ allows the DBMS to restore the database to a condition and restart processing transactions.

Exact Match transaction log

The ________ is a record of the essential data for each transaction that has been processed against the database.

inconsistent read problem

The ________ occurs when one user reads data that have been partially updated by another user.

restore/rerun

The ________ technique involves reprocessing the day's transactions against the backup copy of the database.

encryption

The coding or scrambling of data so that humans cannot read them is called ________.

transaction boundary

The logical beginning and end of a transaction is called a ________.

growing, shrinking

The phases of the two-phase locking protocol are referred to as the ________ phase and the ________ phase.

concurrency control

The process of managing simultaneous operations against a database so that data integrity is maintained is called ________.

data warehouse administrator

The role of a ________ emphasizes integration and coordination of metadata across many data sources.

Shared

________ locks allow other transactions to read but not update a record or other resource.

Dynamic extensibility

________ makes it easier to integrate a new software tool into a development process.


Set pelajaran terkait

A standard piece of paper in Landscape orientation is _____.

View Set

Medical Terminology: Chapter 5: The Integumentary System

View Set

Frandsen Chapter 14 - Cancer Drugs

View Set

EASA Part 66 : Mathematics Question1

View Set

Вступ до спеціальності

View Set

MIS 4340 Multiple Choice Exam 1, MIS 4340 Multiple Choice, MIS 4340 EXAM 1 Multiple Answers, ERP TEST, Intro to ERP Exam 1, ERP Exam 1, Intro to ERP Exam 1, ERP Final Exam, ERP Study Guide Exam 1, MISY 5340 Learning Snacks, MISY 5340 ERP Overview: Ex...

View Set

C459 Module 5: Examining Relationships

View Set