Deck 15: Database Administration and Security

ملء الشاشة (f)
exit full mode
سؤال
Physical protection of hardware and software must be accomplished by the use of open installations with restricted area access.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The end user must provide testing and evaluation services for all the database and DBA applications.
سؤال
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
سؤال
A full backup,or database dump,produces a complete copy of the entire database.
سؤال
The introduction of a DBMS represents a big change and challenge,and is likely to have a profound impact throughout the organization.
سؤال
Concurrent backups take place while the user is working on the database.
سؤال
Backups must be clearly identified through detailed descriptions and date information,assuring that the correct backup is used to recover the database.
سؤال
The DBA works with managers to ensure the quality and integrity of database design and transactions.
سؤال
The storage locations for multiple backups must include sites inside and outside the organization.
سؤال
The DBA interacts with the end user by providing data and information support services to the organization's departments.
سؤال
Incremental backups produce a backup of all data.
سؤال
The DBA function provides data modeling and design services to the end-user community,often through coordination with an application development group within the data-processing department.
سؤال
Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.
سؤال
An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.
سؤال
The DBA must supervise the installation of all software and hardware designated to support the data administration strategy,must have a thorough understanding of the components being installed,and must be familiar with the installation,configuration,and startup procedures of such components.
سؤال
The security,privacy,and integrity of the data in the database are of minimal concern to DBAs who manage current DBMS installations.
سؤال
The DBMS must provide tools that give each level of management a different view of the data and support the required level of decision-making.
سؤال
The end user's role requires a broad understanding of DBMS functions,configuration,programming languages,data modeling and design methodologies,and so on.
سؤال
The DBA is responsible for ensuring that the data are distributed to the right persons,at the right time,and in the right format.
سؤال
The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
سؤال
At the level of middle management,the database must be able to ____.

A) represent and support the company operations as closely as possible
B) deliver the data necessary for tactical decisions and planning
C) produce query results within specified performance levels
D) provide access to external and internal data to identify growth opportunities and to chart the direction of such growth
سؤال
Training people to use the DBMS and its tools is not included in the DBA's technical activities.
سؤال
Protecting the data in the database is a function of authorization management.
سؤال
Database access can be controlled by placing limits on the use of the DBMS's query and reporting tools.
سؤال
There is a growing trend toward ____ in the data-management function.

A) cross-training
B) encapsulation
C) specialization
D) centralization
سؤال
The maintenance activities of the DBA are an extension of the operational activities.
سؤال
The allocation of storage resources is determined when the DBMS is created.
سؤال
The DBA's ____ role is focused on personnel management and on interactions with the end-user community.

A) administrative
B) arbitration
C) technical
D) managerial
سؤال
The ____ administrator is responsible for strategic planning.

A) system
B) data
C) database
D) program
سؤال
As a manager,the DBA must concentrate on the ____ dimensions of the database administration function.

A) control and planning
B) conflict and problem-resolution
C) policies and standards
D) security and privacy
سؤال
It is common practice to define the DBA function by dividing the DBA operations according to the ____ phases.

A) SLA
B) DBLC
C) SDLC
D) MRA
سؤال
A DBMS facilitates ____.

A) interpretation and presentation of data in useful formats
B) destruction of data and information to the right people at the right time
C) data presentation and data usage monitoring for adequate periods of time
D) automatic auditing of all data changes
سؤال
System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
سؤال
Security breaches can yield a database whose integrity is either preserved or corrupted.
سؤال
The DBA's ____ role covers activities involving the use of the DBMS.

A) administrative
B) arbitration
C) technical
D) managerial
سؤال
The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.
سؤال
The DBA must define data views to protect and control the scope of the data that are accessible to an authorized user.
سؤال
When introducing a database into an organization,a(n)____ impact is likely because the database approach creates a more controlled and structured information flow and thus affects people,functions,and interactions.

A) cultural
B) managerial
C) technical
D) operational
سؤال
Testing procedures and standards must already be in place before any application program can be approved for use in the company.
سؤال
The person responsible for the control of the centralized and shared database is the database ____.

A) analyst
B) administrator
C) programmer
D) user
سؤال
____ are written instructions that describe a series of steps to be followed during the performance of a given activity.

A) Policies
B) Standards
C) Documentation
D) Procedures
سؤال
The ____ is responsible for ensuring database security and integrity.

A) database programmer
B) systems analyst
C) data administrator
D) database security officer
سؤال
Classifying users into ____ according to common access needs facilitates the DBA's job of controlling and managing the access privileges of individual users.

A) user groups
B) sections
C) authorization schemes
D) policy definitions
سؤال
____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.

A) Backup and recovery
B) System support
C) Performance monitoring and tuning
D) Security auditing and monitoring
سؤال
A(n)____ data dictionary is automatically updated by the DBMS with every database access.

A) dynamic
B) active
C) passive
D) static
سؤال
Some common physical security practices found in large database installations include secured entrances,password-protected workstations,____,closed-circuit video,and voice-recognition technology.

A) drug testing
B) fingerprinting
C) electronic personnel badges
D) retina scans
سؤال
____ CASE tools provide support for the planning,analysis,and design phases.

A) Front-end
B) Back-end
C) Vertical
D) Horizontal
سؤال
Instructions to create a password are an example of a ____.

A) rule
B) policy
C) standard
D) procedure
سؤال
____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

A) Dangerous
B) Preserving
C) Corrupting
D) Authorized
سؤال
____ are general statements of direction or action that communicate and support DBA goals.

A) Standards
B) Policies
C) Documentation
D) Procedures
سؤال
A(n)____ data dictionary is not updated automatically and usually requires a batch process to be run.

A) active
B) passive
C) static
D) dynamic
سؤال
____ deals with ensuring that data is protected against unauthorized access,and if the data are accessed by an authorized user,that the data are used only for an authorized purpose.

A) Integrity
B) Compliance
C) Availability
D) Confidentiality
سؤال
Current data distribution philosophy makes it easy for ____ end users to access the database.

A) limited
B) unauthorized
C) authorized
D) any
سؤال
____ management is designed to limit access to the database.

A) Authorization
B) User access
C) View
D) DBMS utility
سؤال
Several DBMS packages contain features that allow the creation of a(n)____,which automatically records a brief description of the database operations performed by all users.

A) change tracker
B) digital footprint
C) paper trail
D) audit log
سؤال
Procedures and standards must be revised at least ____ to keep them up-to-date.

A) weekly
B) monthly
C) every six months
D) annually
سؤال
"All users must have passwords" is an example of a ____.

A) rule
B) policy
C) standard
D) procedure
سؤال
A(n)____ plan is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.

A) access
B) completion
C) application
D) communications
سؤال
____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.

A) Guidelines
B) Standards
C) Procedures
D) Documentation
سؤال
User-access management is a subset of ____.

A) password protection
B) authorization management
C) data integrity
D) managerial control
سؤال
____________________ deals with the rights of individuals and the organization to determine the "who,what,when,where,and how" of data usage.
سؤال
A ____ is a named collection of settings that control how much of the database resource a given user can use.

A) user
B) role
C) profile
D) manager
سؤال
____ CASE tools provide support for the coding and implementation phases.

A) Front-end
B) Back-end
C) Vertical
D) Horizontal
سؤال
A(n)____ is a logical storage space in Oracle.

A) audit log
B) datafile
C) schema
D) tablespace
سؤال
Most of today's successful organizations depend on the ____________________ database to provide support for all of their operations-from design to implementation,from sales to services,and from daily decision making to strategic planning.
سؤال
One of the important functions provided by the database ____ is to reserve the resources that must be used by the database at run time.

A) security component
B) authorization manager
C) initialization parameters
D) administrator
سؤال
The ____________________,also known as the information resource manager (IRM),usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA,although the two roles overlap some.
سؤال
A ____ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.

A) user
B) role
C) profile
D) manager
سؤال
____________________ decisions are short term and affect only daily operations; for example,deciding to change the price of a product to clear it from inventory.
سؤال
The DBA's function includes educating the ____________________ in the services provided and how those services enhance data stewardship and data security.
سؤال
Placing the DBA function in a(n)____________________ position often creates a consulting environment in which the DBA is able to devise the data administration strategy but does not have the authority to enforce it or to resolve possible conflicts.
سؤال
The requirement that a password must have a maximum of 12 characters is an example of a(n)____________________.
سؤال
An organization is subject to a(n)_________________________ cycle; that is,the data user applies intelligence to data to produce information that is the basis of knowledge used in decision making by the user.
سؤال
A(n)____ serves as the basis for planning,development,and control of future information systems

A) access plan
B) active data dictionary
C) information systems architecture (ISA)
D) security policy
سؤال
A ____ is a uniquely identifiable object that allows a given person to log on to the database.

A) user
B) role
C) profile
D) manager
سؤال
The ____ component of a CASE tool produces the information system's input/output formats.

A) analysis
B) graphics
C) program document generator
D) screen painter and report generator
سؤال
In the Oracle Enterprise Manager,a ____ is basically any object created by end users; for example,tables,views,indexes,stored procedures,and triggers.

A) component
B) database object
C) policy
D) role
سؤال
The general coordinator of all DBAs is sometimes known as the ____________________ administrator.
سؤال
____ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.

A) Access Management
B) Business Intelligence
C) Information engineering (IE)
D) MOLAP
سؤال
The advent of the DBMS and its shared view of data produced a new level of data management sophistication and led the DP department to evolve into a(n)_________________________ department.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Database Administration and Security
1
Physical protection of hardware and software must be accomplished by the use of open installations with restricted area access.
False
2
The end user must provide testing and evaluation services for all the database and DBA applications.
False
3
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
False
4
A full backup,or database dump,produces a complete copy of the entire database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
The introduction of a DBMS represents a big change and challenge,and is likely to have a profound impact throughout the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
Concurrent backups take place while the user is working on the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
Backups must be clearly identified through detailed descriptions and date information,assuring that the correct backup is used to recover the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
The DBA works with managers to ensure the quality and integrity of database design and transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
The storage locations for multiple backups must include sites inside and outside the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
The DBA interacts with the end user by providing data and information support services to the organization's departments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
Incremental backups produce a backup of all data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
The DBA function provides data modeling and design services to the end-user community,often through coordination with an application development group within the data-processing department.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
The DBA must supervise the installation of all software and hardware designated to support the data administration strategy,must have a thorough understanding of the components being installed,and must be familiar with the installation,configuration,and startup procedures of such components.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
The security,privacy,and integrity of the data in the database are of minimal concern to DBAs who manage current DBMS installations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
The DBMS must provide tools that give each level of management a different view of the data and support the required level of decision-making.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
The end user's role requires a broad understanding of DBMS functions,configuration,programming languages,data modeling and design methodologies,and so on.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
The DBA is responsible for ensuring that the data are distributed to the right persons,at the right time,and in the right format.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
At the level of middle management,the database must be able to ____.

A) represent and support the company operations as closely as possible
B) deliver the data necessary for tactical decisions and planning
C) produce query results within specified performance levels
D) provide access to external and internal data to identify growth opportunities and to chart the direction of such growth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
Training people to use the DBMS and its tools is not included in the DBA's technical activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
Protecting the data in the database is a function of authorization management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
Database access can be controlled by placing limits on the use of the DBMS's query and reporting tools.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
There is a growing trend toward ____ in the data-management function.

A) cross-training
B) encapsulation
C) specialization
D) centralization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
The maintenance activities of the DBA are an extension of the operational activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
The allocation of storage resources is determined when the DBMS is created.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
The DBA's ____ role is focused on personnel management and on interactions with the end-user community.

A) administrative
B) arbitration
C) technical
D) managerial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
The ____ administrator is responsible for strategic planning.

A) system
B) data
C) database
D) program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
As a manager,the DBA must concentrate on the ____ dimensions of the database administration function.

A) control and planning
B) conflict and problem-resolution
C) policies and standards
D) security and privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
It is common practice to define the DBA function by dividing the DBA operations according to the ____ phases.

A) SLA
B) DBLC
C) SDLC
D) MRA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
A DBMS facilitates ____.

A) interpretation and presentation of data in useful formats
B) destruction of data and information to the right people at the right time
C) data presentation and data usage monitoring for adequate periods of time
D) automatic auditing of all data changes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
Security breaches can yield a database whose integrity is either preserved or corrupted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
The DBA's ____ role covers activities involving the use of the DBMS.

A) administrative
B) arbitration
C) technical
D) managerial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
The DBA must define data views to protect and control the scope of the data that are accessible to an authorized user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
When introducing a database into an organization,a(n)____ impact is likely because the database approach creates a more controlled and structured information flow and thus affects people,functions,and interactions.

A) cultural
B) managerial
C) technical
D) operational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
Testing procedures and standards must already be in place before any application program can be approved for use in the company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
The person responsible for the control of the centralized and shared database is the database ____.

A) analyst
B) administrator
C) programmer
D) user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
____ are written instructions that describe a series of steps to be followed during the performance of a given activity.

A) Policies
B) Standards
C) Documentation
D) Procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
The ____ is responsible for ensuring database security and integrity.

A) database programmer
B) systems analyst
C) data administrator
D) database security officer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
Classifying users into ____ according to common access needs facilitates the DBA's job of controlling and managing the access privileges of individual users.

A) user groups
B) sections
C) authorization schemes
D) policy definitions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.

A) Backup and recovery
B) System support
C) Performance monitoring and tuning
D) Security auditing and monitoring
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
A(n)____ data dictionary is automatically updated by the DBMS with every database access.

A) dynamic
B) active
C) passive
D) static
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
Some common physical security practices found in large database installations include secured entrances,password-protected workstations,____,closed-circuit video,and voice-recognition technology.

A) drug testing
B) fingerprinting
C) electronic personnel badges
D) retina scans
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
____ CASE tools provide support for the planning,analysis,and design phases.

A) Front-end
B) Back-end
C) Vertical
D) Horizontal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
Instructions to create a password are an example of a ____.

A) rule
B) policy
C) standard
D) procedure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

A) Dangerous
B) Preserving
C) Corrupting
D) Authorized
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
____ are general statements of direction or action that communicate and support DBA goals.

A) Standards
B) Policies
C) Documentation
D) Procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
A(n)____ data dictionary is not updated automatically and usually requires a batch process to be run.

A) active
B) passive
C) static
D) dynamic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
____ deals with ensuring that data is protected against unauthorized access,and if the data are accessed by an authorized user,that the data are used only for an authorized purpose.

A) Integrity
B) Compliance
C) Availability
D) Confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
Current data distribution philosophy makes it easy for ____ end users to access the database.

A) limited
B) unauthorized
C) authorized
D) any
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
____ management is designed to limit access to the database.

A) Authorization
B) User access
C) View
D) DBMS utility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
Several DBMS packages contain features that allow the creation of a(n)____,which automatically records a brief description of the database operations performed by all users.

A) change tracker
B) digital footprint
C) paper trail
D) audit log
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
Procedures and standards must be revised at least ____ to keep them up-to-date.

A) weekly
B) monthly
C) every six months
D) annually
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
"All users must have passwords" is an example of a ____.

A) rule
B) policy
C) standard
D) procedure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
A(n)____ plan is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.

A) access
B) completion
C) application
D) communications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.

A) Guidelines
B) Standards
C) Procedures
D) Documentation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
User-access management is a subset of ____.

A) password protection
B) authorization management
C) data integrity
D) managerial control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
____________________ deals with the rights of individuals and the organization to determine the "who,what,when,where,and how" of data usage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
A ____ is a named collection of settings that control how much of the database resource a given user can use.

A) user
B) role
C) profile
D) manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
____ CASE tools provide support for the coding and implementation phases.

A) Front-end
B) Back-end
C) Vertical
D) Horizontal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
A(n)____ is a logical storage space in Oracle.

A) audit log
B) datafile
C) schema
D) tablespace
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
Most of today's successful organizations depend on the ____________________ database to provide support for all of their operations-from design to implementation,from sales to services,and from daily decision making to strategic planning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
One of the important functions provided by the database ____ is to reserve the resources that must be used by the database at run time.

A) security component
B) authorization manager
C) initialization parameters
D) administrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
The ____________________,also known as the information resource manager (IRM),usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA,although the two roles overlap some.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
A ____ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.

A) user
B) role
C) profile
D) manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
____________________ decisions are short term and affect only daily operations; for example,deciding to change the price of a product to clear it from inventory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
The DBA's function includes educating the ____________________ in the services provided and how those services enhance data stewardship and data security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
Placing the DBA function in a(n)____________________ position often creates a consulting environment in which the DBA is able to devise the data administration strategy but does not have the authority to enforce it or to resolve possible conflicts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
The requirement that a password must have a maximum of 12 characters is an example of a(n)____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
An organization is subject to a(n)_________________________ cycle; that is,the data user applies intelligence to data to produce information that is the basis of knowledge used in decision making by the user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
A(n)____ serves as the basis for planning,development,and control of future information systems

A) access plan
B) active data dictionary
C) information systems architecture (ISA)
D) security policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
A ____ is a uniquely identifiable object that allows a given person to log on to the database.

A) user
B) role
C) profile
D) manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
The ____ component of a CASE tool produces the information system's input/output formats.

A) analysis
B) graphics
C) program document generator
D) screen painter and report generator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
In the Oracle Enterprise Manager,a ____ is basically any object created by end users; for example,tables,views,indexes,stored procedures,and triggers.

A) component
B) database object
C) policy
D) role
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
The general coordinator of all DBAs is sometimes known as the ____________________ administrator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
____ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.

A) Access Management
B) Business Intelligence
C) Information engineering (IE)
D) MOLAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
The advent of the DBMS and its shared view of data produced a new level of data management sophistication and led the DP department to evolve into a(n)_________________________ department.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.