Chapter 8

Ace your homework & exams now with Quizwiz!

Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export? a. Cost b. Future plans c. Portability d. Performance

c. Portability

What can organizations use in their computer systems that allow the system to continue to process database transactions after a hard drive failure? a. UPS b. backup c. RAID d. surge suppressor

c. RAID

If performance testing shows that queries based on frequently accessed fields are taking a long time to complete, what can the DBA do that might improve performance? a. increase the number of columns b. delete foreign keys c. add indexes d. add alternate keys

c. add indexes

If users access only certain fields in a table, how can you improve performance? a. by splitting the table into two or more tables and removing the primary key b. by combining the table with another table that performs better c. by splitting the table into two or more tables that each has the same primary key as the original d. by adding indexes to each column and deleting the primary and alternate keys

c. by splitting the table into two or more tables that each has the same primary key as the original

Which DBA role organizes metadata, and acts as a liaison between the database administrator and the rest of the database staff? a. data architect b. database programmer c. data administrator d. data operations manager

c. data administrator

What is it called when a database is divided into segments and the segments are stored on different computers? a. converged database b. centralized database c. distributed database d. virtual database

c. distributed database

In a LAN, support for ____________________ update is very important because many users might be updating the database at the same time.

concurrent

Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time? a. Concurrent update b. Security c. Integrity d. Limitations

d. Limitations

When evaluating and selecting a DBMS, in which category is the DBA most concerned with benchmarks? a. Cost b. Security c. Integrity d. Performance

d. Performance

Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas? a. Backup and recovery b. Security c. Integrity d. Replication and distributed databases

d. Replication and distributed databases

Which DBA role makes sure the data gets from one place to another with integrity and security? a. data architect b. database programmer c. data administrator d. data operations manager

d. data operations manager

Which group performs additional testing of the database program after the programmers complete their testing? a. customers b. accounting c. users d. quality assurance

d. quality assurance

What is it called when a 2-step identity verification procedure is used to grant users access to the system? a. smart card authorization b. multilayer security c. security in depth d. two-factor authentication

d. two-factor authentication

The data ____________________ is the catalog, but it often contains a wider range of information, including information about tables, fields, indexes, programs, and users.

dictionary

The ____________________ recovery plan specifies the ongoing and emergency actions and procedures required to ensure data availability if a disaster occurs.

disaster

When the primary key cannot be null, this is known as ____________________.

entity integrity

All database users need full access to all tables and fields in the database.

false

If a user is granted the use of the SELECT statement on a table, the user is also authorized to use UPDATE statements even if the user was not specifically granted that permission.

false

Programmers monitor database usage to detect potential security violations.

false

QBE is an example of a procedural language.

false

The ability of a DBMS to allow multiple computers to share access to data and software by running multiple instances of a single, shared database is called a serial database system.

false

The command 'REVOKE REFERENCES ON Customer to bsmith' prevents the bsmith user from using the ALTER TABLE statement to change a table definition.

false

The data architect sets data-handling policies and assigns data entry.

false

When selecting a DBMS, the only database model choice available to the DBA is the relational model.

false

A(n) ____________________ site is a backup site that an organization can switch to in minutes or hours because the site is completely equipped with duplicate hardware, software, and data.

hot

An ____________________ is an internal company network that uses software tools typically used on the Internet and the World Wide Web.

intranet

The database ____________________ manager is concerned with the ongoing maintenance of established databases.

operations

Database ____________________ deals with the ability of the production system to serve users in a timely and responsive manner.

performance

DBAs should have an understanding of information legislation such as the Data ____________________ Act.

protection

A shared lock permits other users to read the data in the database.

true

The DBA determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog.

true

The DBA is responsible for DBMS maintenance, data dictionary management, and training.

true

The data architect designs, builds, and deploys databases.

true

To manage problems that arise from using a DBMS, companies appoint a DBA to manage both the database and the use of the DBMS.

true

When selecting a DBMS and evaluating the concurrent update category, you should determine whether the DBMS resolves deadlock.

true

When selecting a DBMS and evaluating the data definitions category, you should ask if the DBMS supports views.

true

A(n) ____________________ site is a backup site that is equipped with duplicate hardware and software but not data

warm

What type of locks forbid any other user from accessing the data in any way? a. Shared b. Exclusive c. Limited d. Concurrent

b. Exclusive

Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS support encryption, password support, and authorization rules? a. Concurrent update b. Security c. Integrity d. Limitations

b. Security

Which process converts a table that is in third normal form to a table no longer in third normal form? a. conversion b. denormalizing c. normalization d. replication

b. denormalizing

Which of the following is a log of all database maintenance, with dates, license keys, issues or updates, involved personnel, and resolutions? a. system journal b. run-book c. system catalog d. DBMS log

b. run-book

What type of environment do database programmers use to develop new programs and modify existing programs? a. live b. sandbox c. production d. virtual

b. sandbox

Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may be locked and are exclusive locks the only ones permitted? a. Concurrent update b. Data recovery c. Data dictionary d. Security

a. Concurrent update

Which DBA role manages or supervises the construction of large and comprehensive databases? a. data architect b. database programmer c. data administrator d. data operations manager

a. data architect

After the database designers complete the information-level design, what design level does the DBA do next? a. physical b. information c. logical d. graphical

a. physical


Related study sets

Part-66 Questions; Gas Turbine Engines

View Set

Arithmetic and Number Property Rules (GRE)

View Set

Week 3 Chapters 4 & 5 Psychology 456

View Set