Modern Database Management - Self Check 11
Allocating 10 percent over suggested installation space is sufficient for a DBMS.
Balse
Open-source software always comes with complete documentation.
Balse
Specifying database access policies is done during the ________ phase.
Database implementation
________ makes it easier to integrate a new software tool into a development process.
Dynamic extensibility
A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager.
False
A deadlock results when two transactions try to read the same record.
False
A domain is a way to create a structure that acts like a table.
False
A repository of information about data is called a catalog.
False
Backward recovery starts with an earlier copy of the database.
False
Database applications are not very disk intensive.
False
Databases are generally the property of a single department within an organization.
False
Field-level locks are used quite often.
False
In order to perform a restore/rerun, the database must be mirrored.
False
Loss of data integrity does not impact the quality of data in a database.
False
Specifications for transactions do not need to be reviewed quickly.
False
The Information Resource Lexicon System (IRLS) is a computer software tool used to manage and control access to the information repository.
False
The granularity of locking is not a critical decision in database design.
False
The transaction log contains before- and after-images of records that have been modified.
False
There are two principal types of authorization tables: one for subjects and one for facts.
False
Three-factor authentication is most often implemented with a credit card.
False
Versioning takes the pessimistic approach to locking.
False
________ locks allow other transactions to read but not update a record or other resource.
Shared
A DBMS may perform checkpoints automatically or in response to commands in user application programs.
True
A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes.
True
A business transaction is a sequence of steps that constitute some well-defined business activity.
True
A shared lock allows other transactions to read but not update records in use.
True
A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.
True
A typical cause of database destruction is a disk crash.
True
A view can be built to present only the data to which a user requires access.
True
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.
True
CASE tool-generated information should be fed into repositories.
True
Concurrent transactions need to be processed in isolation so that they do not interfere with each other.
True
Correct installation of the DBMS product is essential to any environment.
True
Examination and modification of the SQL code in an application may lead to performance improvements.
True
The data administrator takes responsibility for the overall management of data resources.
True
The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme.
True
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
True
The repository information model defines types, which should be easy to extend.
True
The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.
True
The role of database administration is typically a more hands-on, physical involvement with the management of databases.
True
Two-phase locking results in a growing phase where locks are acquired and a shrinking phase where locks are released.
True
With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.
True
A transaction that terminates abnormally is called a(n) ________ transaction.
aborted
Controls incorporated into a data management system that restrict access to data are called ________.
authorization rules
A ________ measures or detects personal characteristics such as fingerprints
biometric device
A(n) ________ is a facility by which the DBMS refuses to accept any new transactions.
checkpoint facility
The process of managing simultaneous operations against a database so that data integrity is maintained is called ________.
concurrency control
A high-level function that is responsible for the overall management of data resources in an organization is called ________.
data administration
The role of a ________ emphasizes integration and coordination of metadata across many data sources.
data wharehouse administrator
A(n) ________ is an impasse that results when two or more transactions have locked a common resource, and each waits for the other to unlock that resource.
deadlock
The coding or scrambling of data so that humans cannot read them is called ________.
encryption
Open-source DBMS are ________ software that provides the core functionality of an SQL compliant DBMS.
free
The phases of the two-phase locking protocol are referred to as the ________ phase and the ________ phase.
growing, shrinking
A ________ is a query submitted by a DBA to test the current performance of a database or to predict the response time for queries
heartbeat query
The ________ occurs when one user reads data that have been partially updated by another user.
inconsisten read problem
A(n) ________ is a component that stores metadata.
information repository
An audit trail of transactions and database changes is kept by a ________.
journalizing facility
Any data that are retrieved by a user for updating must be ________ until the update is completed or aborted.
locked
The ________ allows the DBMS to restore the database to a correct condition and restart processing transactions.
recovery manager
The ________ technique involves reprocessing the day's transactions against the backup copy of the database.
restore/rerun
A discrete unit of work that must be processed completely or not at all in a computer system is called a(n) ________.
transaction
The logical beginning and end of a transaction is called a ________.
transaction boundary
The ________ is a record of the essential data for each transaction that has been processed against the database.
transaction log
Optimistic concurrency control, or ________, restricts each transaction to a view of the database as of the time that the transaction was started.
versioning