Deck 8: Physical Database Design and Database Infrastructure

ملء الشاشة (f)
exit full mode
سؤال
While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the:

A) user.
B) CEO.
C) XML.
D) operating system.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A requirement to begin designing physical files and databases is:

A) normalized relations.
B) physical tables created.
C) implementation complete.
D) all datatypes determined.
سؤال
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space.

A) query design
B) programmer productivity
C) data integrity
D) data integration
سؤال
Database access frequencies are estimated from:

A) transaction volumes.
B) user logins.
C) security violations.
D) random number generation.
سؤال
In which data model would a code table appear?

A) Conceptual
B) Logical
C) Physical
D) Data layout
سؤال
A method for handling missing data is to:

A) substitute with random numbers for the missing data.
B) track missing data with special reports.
C) perform insensitivity testing.
D) delete the associated row.
سؤال
Sensitivity testing involves:

A) checking to see if your teeth hurt when you brush.
B) seeing how accurate data are.
C) checking to see if missing data will greatly impact results.
D) deleting the associated row.
سؤال
An integrity control supported by a DBMS is:

A) substitute estimates.
B) security.
C) range control.
D) GUI guards.
سؤال
A key decision in the physical design process is:

A) ignoring the size of the database.
B) selecting structures.
C) deciding on the monitor.
D) deciding the e-r diagrams.
سؤال
Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n):

A) extent.
B) table.
C) tablespace.
D) partition.
سؤال
The smallest unit of application data recognized by system software is a:

A) field.
B) row.
C) data type.
D) column.
سؤال
Designing physical files requires ________ of where and when data are used in various ways.

A) maps
B) descriptions
C) keys
D) hints
سؤال
A contiguous section of disk storage space is called a(n):

A) track.
B) sector.
C) extent.
D) tablespace.
سؤال
All of the following are objectives when selecting a data type EXCEPT:

A) represent all possible values.
B) improve data integrity.
C) support all data manipulations.
D) use a lot of storage space.
سؤال
The value a field will assume unless the user enters an explicit value for an instance of that field is called a:

A) default value.
B) null value.
C) range control.
D) gurand.
سؤال
A detailed coding scheme recognized by system software for representing organizational data is called a(n):

A) DBMS code.
B) data type.
C) SQL.
D) DB layout.
سؤال
Which of the following is an objective of selecting a data type?

A) Represent a small number of possible values
B) Maximize storage space
C) Limit security
D) Improve data integrity
سؤال
An appropriate datatype for one wanting a fixed-length type for last name would include:

A) VARCHAR.
B) CHAR.
C) BLOB.
D) DATE.
سؤال
All of the following are valid datatypes in Oracle 12c EXCEPT:

A) VARCHAR2.
B) BOOLEAN.
C) BLOB.
D) NUMBER.
سؤال
An appropriate datatype for adding a sound clip would be:

A) VARCHAR.
B) CHAR.
C) BLOB.
D) DATE.
سؤال
A method to allow adjacent secondary memory space to contain rows from several tables is called:

A) cluttering.
B) clustering.
C) concatenating.
D) compiling.
سؤال
A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers, and join tables to prepare query results is the:

A) explain plan.
B) show optimization.
C) explain query.
D) analyze query.
سؤال
A(n) ________ is a field of data used to locate a related field or record.

A) key
B) index
C) lock
D) pointer
سؤال
In most cases, the goal of ________ dominates the design process.

A) efficient data processing
B) security
C) quick pointer updates
D) shorter design times
سؤال
Horizontal partitioning makes sense:

A) when different categories of a table's rows are processed separately.
B) when less security is needed.
C) when partitions must be organized the same.
D) when only one category is allowed.
سؤال
An index on columns from two or more tables that come from the same domain of values is called a:

A) bitmap index.
B) multivalued index.
C) join index.
D) transaction index.
سؤال
Which type of file is easiest to update?

A) Sequential
B) Hashed
C) Indexed
D) Clustered
سؤال
A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices.

A) physical pointer
B) retrieval program
C) file organization
D) update program
سؤال
All of the following are common denormalization opportunities EXCEPT:

A) two entities with a one-to-one relationship.
B) a one-to-many relationship.
C) a many-to-many relationship with nonkey attributes.
D) reference data.
سؤال
An advantage of partitioning is:

A) efficiency.
B) remote optimization.
C) extra space and update time.
D) increase redundancy.
سؤال
A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called:

A) multiple partition queries.
B) perpendicular query processing.
C) parallel query processing.
D) query optimization.
سؤال
A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a:

A) hashed file organization.
B) hash key.
C) multi-indexed file organization.
D) hash index table.
سؤال
A(n) ________ is a routine that converts a primary key value into a record address.

A) record index calculator
B) index pointer program
C) hashing algorithm
D) pointing algorithm
سؤال
A factor to consider when choosing a file organization is:

A) inefficient data retrieval.
B) DDL.
C) efficient storage.
D) DML.
سؤال
A disadvantage of partitioning is:

A) simplicity.
B) remote optimization.
C) extra space and update time.
D) shorter technology spans.
سؤال
Which type of file is most efficient with storage space?

A) Sequential
B) Hashed
C) Indexed
D) Clustered
سؤال
Distributing the rows of data into separate files is called:

A) normalization.
B) horizontal partitioning.
C) vertical partitioning.
D) file allocation.
سؤال
In which type of file is multiple key retrieval not possible?

A) Sequential
B) Hashed
C) Indexed
D) Clustered
سؤال
A file organization where files are not stored in any particular order is considered a:

A) hashed file organization.
B) hash key.
C) multi-indexed file organization.
D) heap file organization.
سؤال
One field or combination of fields for which more than one record may have the same combination of values is called a(n):

A) secondary key.
B) index.
C) composite key.
D) linked key.
سؤال
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:

A) checkpoint facility.
B) backup facility.
C) recovery manager.
D) database change log.
سؤال
A discrete unit of work that must be processed completely or not at all within a computer system is called a:

A) change control device.
B) transaction.
C) before image.
D) journalizing facility.
سؤال
Forward recovery is faster than restore/rerun because:

A) transactions do not have to be repeated.
B) security can be avoided.
C) images are mirrored.
D) systems are more complete.
سؤال
The preferred method of fixing an aborted transaction is:

A) repairing the schema.
B) switching.
C) duplication of data.
D) backing out the transaction.
سؤال
When incorrect data have been introduced, the database is best recovered by:

A) starting with a new ERD.
B) formatting server.
C) restarting from the most recent checkpoint and processing subsequent transactions.
D) reloading RDMS software.
سؤال
________ is used to undo unwanted database changes.

A) Rollback
B) Rollforward
C) Restart
D) Encryption
سؤال
Which of the following is a principal type of authorization table?

A) Subject
B) Transaction
C) View
D) Index
سؤال
While views promote security by restricting user access to data, they are not adequate security measures because:

A) an unauthorized person may gain access to a view through experimentation.
B) all users can read any view.
C) a view's data does not change.
D) views are not possible to create in most DBMS.
سؤال
The coding or scrambling of data so that humans cannot read them is called:

A) demarcation.
B) hiding.
C) encoding.
D) encryption.
سؤال
________ partitioning distributes the columns of a table into several separate physical records.

A) Horizontal
B) Crossways
C) Vertical
D) Final
سؤال
An audit trail of database changes is kept by a:

A) change control device.
B) subschema.
C) before image.
D) journalizing facility.
سؤال
Sarbanes-Oxley Act was enacted to ensure the integrity of:

A) SQL.
B) public companies' financial statements.
C) private companies' shareholders meetings.
D) Entity-Relationship Diagrams.
سؤال
Guidelines for server security should include all of the following EXCEPT:

A) securing the network between client and server.
B) guidelines for password lengths.
C) password naming conventions.
D) guidelines for frequency of password changes.
سؤال
Which of the following threats involves outside parties using information to embarrass a company?

A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
سؤال
A form of denormalization where the same data are purposely stored in multiple places in the database is called:

A) data duplication.
B) data replication.
C) advanced placement.
D) horizontal partitioning.
سؤال
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process, and output electronic data in a secure manner is called a(n):

A) smart chip.
B) smart card.
C) e-credit card.
D) secure card.
سؤال
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.

A) backup facility
B) recovery manager
C) restart facility
D) transaction logger
سؤال
Controls designed to restrict access and activities are called:

A) schemas.
B) business rules.
C) encryption controls.
D) authorization rules.
سؤال
A trigger can be used as a security measure in which of the following ways?

A) To check for viruses
B) To cause special handling procedures to be executed
C) To design a database
D) To conduct a DFD analysis
سؤال
A device to measure or detect fingerprints or signatures is called a(n) ________ device.

A) biometric
B) view
C) ink
D) laser
سؤال
The smallest unit of named application data is a record.
سؤال
A data management platform service is called:

A) Infrastructure-as-a-service.
B) Platform-as-a-service.
C) Software-as-a-service.
D) Database-as-a-service.
سؤال
A cloud computing approach in which the service consists mainly of hardware and systems software resources is called:

A) Infrastructure-as-a-service.
B) Platform-as-a-service.
C) Software-as-a-service.
D) IDE.
سؤال
All of the following are advantages to cloud-based computing EXCEPT:

A) no need for initial investment in hardware, physical facilities and systems software.
B) elasticity.
C) organizations can explore new data management technologies more easily.
D) ACID support for database as a service.
سؤال
Requirements for response time, data security, backup, and recovery are all requirements for physical design.
سؤال
The Number datatype would be appropriate for a zip code.
سؤال
With ________, the database itself is lost, destroyed, or cannot be read.

A) aborted transaction
B) database destruction
C) incorrect data
D) system failure
سؤال
The logical database design always forms the best foundation for grouping attributes in the physical design.
سؤال
SOX stands for the Sorbet-Oxford Act.
سؤال
A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called:

A) Software-as-a-service.
B) Platform-as-a-service.
C) Infrastructure-as-a-service.
D) Tools-as-a-service.
سؤال
A default value is the value that a field will always assume, regardless of what the user enters for an instance of that field.
سؤال
All of the following are disadvantages to cloud-based computing EXCEPT:

A) the promise of elasticity is not fulfilled because the model will not adapt to changing requirements.
B) live migration from one environment to another is a challenge.
C) DBaaS is still struggling to provide ACID properties of databases.
D) the visibility of costs of data management is better.
سؤال
Efficient database structures will be beneficial only if queries and the underlying database management system are tuned to properly use the structures.
سؤال
A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called:

A) Infrastructure-as-a-service.
B) Platform-as-a-service.
C) Software-as-a-service.
D) Soft-computing-service.
سؤال
A transaction that terminates abnormally is called a(n) ________ transaction.

A) terminated
B) aborted
C) completed
D) deleted
سؤال
One objective of selecting a data type is to minimize storage space.
سؤال
One decision in the physical design process is selecting structures.
سؤال
VarChar2 would be appropriate for a user that wanted a text datatype for LastName that would only consume the required space.
سؤال
All of the following are characteristics of cloud technologies EXCEPT:

A) unlimited bandwidth.
B) on-demand self-service IT capabilities.
C) broad network access.
D) rapid elasticity.
سؤال
Adding notations to the EER diagram regarding data volumes and usage is of no value to the physical design process.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/167
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Physical Database Design and Database Infrastructure
1
While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the:

A) user.
B) CEO.
C) XML.
D) operating system.
D
2
A requirement to begin designing physical files and databases is:

A) normalized relations.
B) physical tables created.
C) implementation complete.
D) all datatypes determined.
A
3
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space.

A) query design
B) programmer productivity
C) data integrity
D) data integration
C
4
Database access frequencies are estimated from:

A) transaction volumes.
B) user logins.
C) security violations.
D) random number generation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
5
In which data model would a code table appear?

A) Conceptual
B) Logical
C) Physical
D) Data layout
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
6
A method for handling missing data is to:

A) substitute with random numbers for the missing data.
B) track missing data with special reports.
C) perform insensitivity testing.
D) delete the associated row.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
7
Sensitivity testing involves:

A) checking to see if your teeth hurt when you brush.
B) seeing how accurate data are.
C) checking to see if missing data will greatly impact results.
D) deleting the associated row.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
8
An integrity control supported by a DBMS is:

A) substitute estimates.
B) security.
C) range control.
D) GUI guards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
9
A key decision in the physical design process is:

A) ignoring the size of the database.
B) selecting structures.
C) deciding on the monitor.
D) deciding the e-r diagrams.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
10
Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n):

A) extent.
B) table.
C) tablespace.
D) partition.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
11
The smallest unit of application data recognized by system software is a:

A) field.
B) row.
C) data type.
D) column.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
12
Designing physical files requires ________ of where and when data are used in various ways.

A) maps
B) descriptions
C) keys
D) hints
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
13
A contiguous section of disk storage space is called a(n):

A) track.
B) sector.
C) extent.
D) tablespace.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
14
All of the following are objectives when selecting a data type EXCEPT:

A) represent all possible values.
B) improve data integrity.
C) support all data manipulations.
D) use a lot of storage space.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
15
The value a field will assume unless the user enters an explicit value for an instance of that field is called a:

A) default value.
B) null value.
C) range control.
D) gurand.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
16
A detailed coding scheme recognized by system software for representing organizational data is called a(n):

A) DBMS code.
B) data type.
C) SQL.
D) DB layout.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is an objective of selecting a data type?

A) Represent a small number of possible values
B) Maximize storage space
C) Limit security
D) Improve data integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
18
An appropriate datatype for one wanting a fixed-length type for last name would include:

A) VARCHAR.
B) CHAR.
C) BLOB.
D) DATE.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
19
All of the following are valid datatypes in Oracle 12c EXCEPT:

A) VARCHAR2.
B) BOOLEAN.
C) BLOB.
D) NUMBER.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
20
An appropriate datatype for adding a sound clip would be:

A) VARCHAR.
B) CHAR.
C) BLOB.
D) DATE.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
21
A method to allow adjacent secondary memory space to contain rows from several tables is called:

A) cluttering.
B) clustering.
C) concatenating.
D) compiling.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
22
A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers, and join tables to prepare query results is the:

A) explain plan.
B) show optimization.
C) explain query.
D) analyze query.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
23
A(n) ________ is a field of data used to locate a related field or record.

A) key
B) index
C) lock
D) pointer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
24
In most cases, the goal of ________ dominates the design process.

A) efficient data processing
B) security
C) quick pointer updates
D) shorter design times
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
25
Horizontal partitioning makes sense:

A) when different categories of a table's rows are processed separately.
B) when less security is needed.
C) when partitions must be organized the same.
D) when only one category is allowed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
26
An index on columns from two or more tables that come from the same domain of values is called a:

A) bitmap index.
B) multivalued index.
C) join index.
D) transaction index.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which type of file is easiest to update?

A) Sequential
B) Hashed
C) Indexed
D) Clustered
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices.

A) physical pointer
B) retrieval program
C) file organization
D) update program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
29
All of the following are common denormalization opportunities EXCEPT:

A) two entities with a one-to-one relationship.
B) a one-to-many relationship.
C) a many-to-many relationship with nonkey attributes.
D) reference data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
30
An advantage of partitioning is:

A) efficiency.
B) remote optimization.
C) extra space and update time.
D) increase redundancy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
31
A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called:

A) multiple partition queries.
B) perpendicular query processing.
C) parallel query processing.
D) query optimization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
32
A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a:

A) hashed file organization.
B) hash key.
C) multi-indexed file organization.
D) hash index table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
33
A(n) ________ is a routine that converts a primary key value into a record address.

A) record index calculator
B) index pointer program
C) hashing algorithm
D) pointing algorithm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
34
A factor to consider when choosing a file organization is:

A) inefficient data retrieval.
B) DDL.
C) efficient storage.
D) DML.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
35
A disadvantage of partitioning is:

A) simplicity.
B) remote optimization.
C) extra space and update time.
D) shorter technology spans.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which type of file is most efficient with storage space?

A) Sequential
B) Hashed
C) Indexed
D) Clustered
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
37
Distributing the rows of data into separate files is called:

A) normalization.
B) horizontal partitioning.
C) vertical partitioning.
D) file allocation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
38
In which type of file is multiple key retrieval not possible?

A) Sequential
B) Hashed
C) Indexed
D) Clustered
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
39
A file organization where files are not stored in any particular order is considered a:

A) hashed file organization.
B) hash key.
C) multi-indexed file organization.
D) heap file organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
40
One field or combination of fields for which more than one record may have the same combination of values is called a(n):

A) secondary key.
B) index.
C) composite key.
D) linked key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
41
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:

A) checkpoint facility.
B) backup facility.
C) recovery manager.
D) database change log.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
42
A discrete unit of work that must be processed completely or not at all within a computer system is called a:

A) change control device.
B) transaction.
C) before image.
D) journalizing facility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
43
Forward recovery is faster than restore/rerun because:

A) transactions do not have to be repeated.
B) security can be avoided.
C) images are mirrored.
D) systems are more complete.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
44
The preferred method of fixing an aborted transaction is:

A) repairing the schema.
B) switching.
C) duplication of data.
D) backing out the transaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
45
When incorrect data have been introduced, the database is best recovered by:

A) starting with a new ERD.
B) formatting server.
C) restarting from the most recent checkpoint and processing subsequent transactions.
D) reloading RDMS software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
46
________ is used to undo unwanted database changes.

A) Rollback
B) Rollforward
C) Restart
D) Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following is a principal type of authorization table?

A) Subject
B) Transaction
C) View
D) Index
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
48
While views promote security by restricting user access to data, they are not adequate security measures because:

A) an unauthorized person may gain access to a view through experimentation.
B) all users can read any view.
C) a view's data does not change.
D) views are not possible to create in most DBMS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
49
The coding or scrambling of data so that humans cannot read them is called:

A) demarcation.
B) hiding.
C) encoding.
D) encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
50
________ partitioning distributes the columns of a table into several separate physical records.

A) Horizontal
B) Crossways
C) Vertical
D) Final
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
51
An audit trail of database changes is kept by a:

A) change control device.
B) subschema.
C) before image.
D) journalizing facility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
52
Sarbanes-Oxley Act was enacted to ensure the integrity of:

A) SQL.
B) public companies' financial statements.
C) private companies' shareholders meetings.
D) Entity-Relationship Diagrams.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
53
Guidelines for server security should include all of the following EXCEPT:

A) securing the network between client and server.
B) guidelines for password lengths.
C) password naming conventions.
D) guidelines for frequency of password changes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following threats involves outside parties using information to embarrass a company?

A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
55
A form of denormalization where the same data are purposely stored in multiple places in the database is called:

A) data duplication.
B) data replication.
C) advanced placement.
D) horizontal partitioning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
56
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process, and output electronic data in a secure manner is called a(n):

A) smart chip.
B) smart card.
C) e-credit card.
D) secure card.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
57
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.

A) backup facility
B) recovery manager
C) restart facility
D) transaction logger
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
58
Controls designed to restrict access and activities are called:

A) schemas.
B) business rules.
C) encryption controls.
D) authorization rules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
59
A trigger can be used as a security measure in which of the following ways?

A) To check for viruses
B) To cause special handling procedures to be executed
C) To design a database
D) To conduct a DFD analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
60
A device to measure or detect fingerprints or signatures is called a(n) ________ device.

A) biometric
B) view
C) ink
D) laser
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
61
The smallest unit of named application data is a record.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
62
A data management platform service is called:

A) Infrastructure-as-a-service.
B) Platform-as-a-service.
C) Software-as-a-service.
D) Database-as-a-service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
63
A cloud computing approach in which the service consists mainly of hardware and systems software resources is called:

A) Infrastructure-as-a-service.
B) Platform-as-a-service.
C) Software-as-a-service.
D) IDE.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
64
All of the following are advantages to cloud-based computing EXCEPT:

A) no need for initial investment in hardware, physical facilities and systems software.
B) elasticity.
C) organizations can explore new data management technologies more easily.
D) ACID support for database as a service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
65
Requirements for response time, data security, backup, and recovery are all requirements for physical design.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
66
The Number datatype would be appropriate for a zip code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
67
With ________, the database itself is lost, destroyed, or cannot be read.

A) aborted transaction
B) database destruction
C) incorrect data
D) system failure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
68
The logical database design always forms the best foundation for grouping attributes in the physical design.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
69
SOX stands for the Sorbet-Oxford Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
70
A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called:

A) Software-as-a-service.
B) Platform-as-a-service.
C) Infrastructure-as-a-service.
D) Tools-as-a-service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
71
A default value is the value that a field will always assume, regardless of what the user enters for an instance of that field.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
72
All of the following are disadvantages to cloud-based computing EXCEPT:

A) the promise of elasticity is not fulfilled because the model will not adapt to changing requirements.
B) live migration from one environment to another is a challenge.
C) DBaaS is still struggling to provide ACID properties of databases.
D) the visibility of costs of data management is better.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
73
Efficient database structures will be beneficial only if queries and the underlying database management system are tuned to properly use the structures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
74
A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called:

A) Infrastructure-as-a-service.
B) Platform-as-a-service.
C) Software-as-a-service.
D) Soft-computing-service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
75
A transaction that terminates abnormally is called a(n) ________ transaction.

A) terminated
B) aborted
C) completed
D) deleted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
76
One objective of selecting a data type is to minimize storage space.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
77
One decision in the physical design process is selecting structures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
78
VarChar2 would be appropriate for a user that wanted a text datatype for LastName that would only consume the required space.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
79
All of the following are characteristics of cloud technologies EXCEPT:

A) unlimited bandwidth.
B) on-demand self-service IT capabilities.
C) broad network access.
D) rapid elasticity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
80
Adding notations to the EER diagram regarding data volumes and usage is of no value to the physical design process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 167 في هذه المجموعة.