CIS 3050 Bank 3

Ace your homework & exams now with Quizwiz!

A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called: A) multiple partition queries. B) perpendicular query processing. C) parallel query processing. D) query optimization.

C

In which data model would a code table appear? A) Conceptual B) Logical C) Physical D) Data layout

C

A device to measure or detect fingerprints or signatures is called a(n) ________ device. A) biometric B) view C) ink D) laser

A

Sarbanes-Oxley Act was enacted to ensure the integrity of: A) SQL. B) public companies' financial statements. C) private companies' shareholders meetings. D) Entity-Relationship Diagrams.

B

A(n) ________ is a field of data used to locate a related field or record. A) key B) index C) lock D) pointer

D

Distributing the rows of data into separate files is called: A) normalization. B) horizontal partitioning. C) vertical partitioning. D) file allocation.

B

Which type of file is easiest to update? A) Sequential B) Hashed C) Indexed D) Clustered

B

________ partitioning distributes the columns of a table into several separate physical records. A) Horizontal B) Crossways C) Vertical D) Final

C

A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a: A) checkpoint facility. B) backup facility. C) recovery manager. D) database change log.

A

The smallest unit of application data recognized by system software is a: A) field. B) row. C) data type. D) column.

A

A transaction that terminates abnormally is called a(n) ________ transaction. A) terminated B) aborted C) completed D) deleted

B

A data management platform service is called: A) Infrastructure-as-a-service. B) Platform-as-a-service. C) Software-as-a-service. D) Database-as-a-service.

D

An appropriate datatype for adding a sound clip would be: A) VARCHAR. B) CHAR. C) BLOB. D) DATE

C

In which type of file is multiple key retrieval not possible? A) Sequential B) Hashed C) Indexed D) Clustered

B

With ________, the database itself is lost, destroyed, or cannot be read. A) aborted transaction B) database destruction C) incorrect data D) system failure

B

An index on columns from two or more tables that come from the same domain of values is called a: A) bitmap index. B) multivalued index. C) join index. D) transaction index.

C

The coding or scrambling of data so that humans cannot read them is called: A) demarcation. B) hiding. C) encoding. D) encryption.

D

Which of the following is a principal type of authorization table? A) Subject B) Transaction C) View D) Index

A

Which type of file is most efficient with storage space? A) Sequential B) Hashed C) Indexed D) Clustered

A

While views promote security by restricting user access to data, they are not adequate security measures because: A) an unauthorized person may gain access to a view through experimentation. B) all users can read any view. C) a view's data does not change. D) views are not possible to create in most DBMS.

A

________ is used to undo unwanted database changes. A) Rollback B) Rollforward C) Restart D) Encryption

A

A cloud computing approach in which the service consists mainly of hardware and systems software resources is called: A) Infrastructure-as-a-service. B) Platform-as-a-service. C) Software-as-a-service. D) IDE.

A

A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers, and join tables to prepare query results is the: A) explain plan. B) show optimization. C) explain query. D) analyze query.

A

A requirement to begin designing physical files and databases is: A) normalized relations. B) physical tables created. C) implementation complete. D) all datatypes determined.

A

All of the following are characteristics of cloud technologies EXCEPT: A) unlimited bandwidth. B) on-demand self-service IT capabilities. C) broad network access. D) rapid elasticity.

A

An advantage of partitioning is: A) efficiency. B) remote optimization. C) extra space and update time. D) increase redundancy.

A

Database access frequencies are estimated from: A) transaction volumes. B) user logins. C) security violations. D) random number generation.

A

Forward recovery is faster than restore/rerun because: A) transactions do not have to be repeated. B) security can be avoided. C) images are mirrored. D) systems are more complete.

A

Guidelines for server security should include all of the following EXCEPT: A) securing the network between client and server. B) guidelines for password lengths. C) password naming conventions. D) guidelines for frequency of password changes.

A

Horizontal partitioning makes sense: A) when different categories of a table's rows are processed separately. B) when less security is needed. C) when partitions must be organized the same. D) when only one category is allowed.

A

In most cases, the goal of ________ dominates the design process. A) efficient data processing B) security C) quick pointer updates D) shorter design times

A

One field or combination of fields for which more than one record may have the same combination of values is called a(n): A) secondary key. B) index. C) composite key. D) linked key.

A

The value a field will assume unless the user enters an explicit value for an instance of that field is called a: A) default value. B) null value. C) range control. D) gurand.

A

A ________ is a DBMS module that restores the database to a correct condition when a failure occurs. A) backup facility B) recovery manager C) restart facility D) transaction logger

B

A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called: A) Software-as-a-service. B) Platform-as-a-service. C) Infrastructure-as-a-service. D) Tools-as-a-service.

B

A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process, and output electronic data in a secure manner is called a(n): A) smart chip. B) smart card. C) e-credit card. D) secure card.

B

A detailed coding scheme recognized by system software for representing organizational data is called a(n): A) DBMS code. B) data type. C) SQL. D) DB layout.

B

A discrete unit of work that must be processed completely or not at all within a computer system is called a: A) change control device. B) transaction. C) before image. D) journalizing facility

B

A form of denormalization where the same data are purposely stored in multiple places in the database is called: A) data duplication. B) data replication. C) advanced placement. D) horizontal partitioning.

B

A key decision in the physical design process is: A) ignoring the size of the database. B) selecting structures. C) deciding on the monitor. D) deciding the e-r diagrams.

B

A method for handling missing data is to: B) track missing data with special reports. C) perform insensitivity testing. D) delete the associated row.

B

A method to allow adjacent secondary memory space to contain rows from several tables is called: A) cluttering. B) clustering. C) concatenating. D) compiling.

B

A trigger can be used as a security measure in which of the following ways? A) To check for viruses B) To cause special handling procedures to be executed C) To design a database D) To conduct a DFD analysis

B

All of the following are common denormalization opportunities EXCEPT: A) two entities with a one-to-one relationship. B) a one-to-many relationship. C) a many-to-many relationship with nonkey attributes. D) reference data.

B

All of the following are valid datatypes in Oracle 12c EXCEPT: A) VARCHAR2. B) BOOLEAN. C) BLOB. D) NUMBER.

B

An appropriate datatype for one wanting a fixed-length type for last name would include: A) VARCHAR. B) CHAR. C) BLOB. D) DATE.

B

Designing physical files requires ________ of where and when data are used in various ways. A) maps B) descriptions C) keys D) hints

B

A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called: A) Infrastructure-as-a-service. B) Platform-as-a-service. C) Software-as-a-service. D) Soft-computing-service

C

A contiguous section of disk storage space is called a(n): A) track. B) sector. C) extent. D) tablespace

C

A disadvantage of partitioning is: A) simplicity. B) remote optimization. C) extra space and update time. D) shorter technology spans.

C

A factor to consider when choosing a file organization is: A) inefficient data retrieval. B) DDL. C) efficient storage. D) DML.

C

A(n) ________ is a routine that converts a primary key value into a record address. A) record index calculator B) index pointer program C) hashing algorithm D) pointing algorithm

C

A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices. A) physical pointer B) retrieval program C) file organization D) update program

C

An integrity control supported by a DBMS is: A) substitute estimates. B) security. C) range control. D) GUI guards.

C

Sensitivity testing involves: A) checking to see if your teeth hurt when you brush. B) seeing how accurate data are. C) checking to see if missing data will greatly impact results. D) deleting the associated row

C

The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. A) query design B) programmer productivity C) data integrity D) data integration

C

When incorrect data have been introduced, the database is best recovered by: A) starting with a new ERD. B) formatting server. C) restarting from the most recent checkpoint and processing subsequent transactions. D) reloading RDMS software.

C

Which of the following threats involves outside parties using information to embarrass a company? A) Accidental loss B) Theft and fraud C) Loss of confidentiality D) Loss of data integrity

C

Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n): A) extent. B) table. C) tablespace. D) partition.

C

A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a: A) hashed file organization. B) hash key. C) multi-indexed file organization. D) hash index table.

D

A file organization where files are not stored in any particular order is considered a: A) hashed file organization. B) hash key. C) multi-indexed file organization. D) heap file organization.

D

All of the following are advantages to cloud-based computing EXCEPT: A) no need for initial investment in hardware, physical facilities and systems software. B) elasticity. C) organizations can explore new data management technologies more easily. D) ACID support for database as a service.

D

All of the following are disadvantages to cloud-based computing EXCEPT: A) the promise of elasticity is not fulfilled because the model will not adapt to changing requirements. B) live migration from one environment to another is a challenge. C) DBaaS is still struggling to provide ACID properties of databases. D) the visibility of costs of data management is better.

D

All of the following are objectives when selecting a data type EXCEPT: A) represent all possible values. B) improve data integrity. C) support all data manipulations. D) use a lot of storage space.

D

An audit trail of database changes is kept by a: A) change control device. B) subschema. C) before image. D) journalizing facility.

D

Controls designed to restrict access and activities are called: A) schemas. B) business rules. C) encryption controls. D) authorization rules.

D

The preferred method of fixing an aborted transaction is: A) repairing the schema. B) switching. C) duplication of data. D) backing out the transaction.

D

Which of the following is an objective of selecting a data type? A) Represent a small number of possible values B) Maximize storage space C) Limit security D) Improve data integrity

D

While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the: A) user. B) CEO. C) XML. D) operating system.

D


Related study sets

cspp Chapter 8 - Intrusion Detection - Stallings 4th ed.

View Set

Measures of Central Tendency - A measure of central tendency is a single value that attempts to describe a set of data by identifying the central position within that set of data.

View Set

Collection Agencies and Credit Reporting

View Set

Marketing Research and Seminar Chapter 1, 2, 3

View Set

Questions I've gotten wrong CFP

View Set

9.5.4 Security Pro Practice Questions

View Set

IBUS 311 Emerging Market Ch 7 / 10

View Set