Deck 11: Data and Database Administration

ملء الشاشة (f)
exit full mode
سؤال
The W3C standard for Web privacy is called:

A) The Web privacy act.
B) Platform for Privacy Preferences.
C) Freedom of Web Information Act.
D) The Magna Carta.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is a principal type of authorization table?

A) Subject
B) Transaction
C) View
D) Index
سؤال
An open-source DBMS is:

A) a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
B) a beta release of a commercial RDBMS.
C) an object-oriented database management system.
D) source code for a commercial RDBMS.
سؤال
An organization should have one data warehouse administrator for every:

A) 100 users.
B) 100 gigabytes of data in the enterprise data warehouse.
C) department.
D) processor.
سؤال
While views promote security by restricting user access to data,they are not adequate security measures because:

A) an unauthorized person may gain access to a view through experimentation.
B) all users can read any view.
C) a view's data does not change.
D) none of the above.
سؤال
Guidelines for server security should include all of the following EXCEPT:

A) securing the network between client and server.
B) guidelines for password lengths.
C) password naming conventions.
D) guidelines for frequency of password changes.
سؤال
Which of the following is a type of network security:

A) authentication of the client workstation.
B) password naming conventions.
C) guidelines for frequency of password changes.
D) all of the above.
سؤال
Which of the following functions do cost/benefit models?

A) Database planning
B) Database analysis
C) Database design
D) Operations
سؤال
Which of the following threats involves outside parties using information to embarrass a company?

A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
سؤال
Which of the following skills are required of a database administrator?

A) Broad technical background
B) Solid understanding of hardware architectures
C) Managerial skills
D) All of the above
سؤال
Which of the following is true of poor data and/or database administration?

A) Data timing problems
B) Multiple entity definitions
C) Unknown meanings of stored data
D) All of the above
سؤال
Which of the following characteristics is required of a data administration manager?

A) Good people skills
B) Sufficient technical skills
C) Ability to sell users on ideas
D) All of the above
سؤال
________ is a technical function responsible for database design,security,and disaster recovery.

A) Data administration
B) Database administration
C) Tech support
D) Operations
سؤال
Controls designed to restrict access and activities are called:

A) schemas.
B) business rules.
C) encryption controls.
D) authorization rules.
سؤال
An information repository supplies information to:

A) users.
B) automated CASE tools.
C) database management systems.
D) all of the above.
سؤال
A data warehouse administrator has which of the following responsibilities?

A) Build and administer an environment supportive of decision-support applications
B) Build a stable architecture for the data warehouse
C) Develop service level agreements with suppliers and consumers of data for the data warehouse
D) All of the above
سؤال
Security measures for dynamic Web pages are different from static HTML pages because:

A) dynamic Web pages are built "on the fly".
B) static Web pages contain more sensitive data.
C) the connection requires full access to the database for dynamic pages.
D) all of the above.
سؤال
A trigger can be used as a security measure in which of the following ways?

A) To prohibit inappropriate actions
B) To cause special handling procedures to be executed
C) To cause a row to be written to a log file
D) All of the above
سؤال
Which of the following functions develop integrity controls?

A) Database planning
B) Database analysis
C) Database implementation
D) Database design
سؤال
Which of the following functions model business rules?

A) Database planning
B) Database analysis
C) Database design
D) Operations
سؤال
Which of the following is not a component of a repository system architecture?

A) An informational model
B) The repository engine
C) A data transformation process
D) The repository database
سؤال
Forward recovery is faster than restore/rerun because:

A) transactions do not have to be repeated.
B) security can be avoided.
C) images are mirrored.
D) systems are more complete.
سؤال
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store,process and output electronic data in a secure manner is called a(n):

A) smart chip.
B) smart card.
C) e-credit card.
D) secure card.
سؤال
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.

A) logging
B) concurrency control
C) transaction authorization
D) multiple management
سؤال
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.

A) backup facility
B) recovery manager
C) restart facility
D) transaction logger
سؤال
Which of the following functions are supported by a repository engine?

A) Object management
B) Relationship management
C) Version management
D) All of the above
سؤال
________ is used to undo unwanted database changes.

A) Rollback
B) Rollforward
C) Restart
D) Encryption
سؤال
Which of the following is NOT an area of concern when trying to maintain a well-tuned database?

A) Memory usage
B) CPU usage
C) Input/output contention
D) User interface design
سؤال
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:

A) checkpoint facility.
B) backup facility.
C) recovery manager.
D) database change log.
سؤال
A(n)________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

A) record controller
B) exclusive lock
C) authorization rule
D) two-phase lock
سؤال
The extent of the database resource that is included with each lock is called the level of:

A) impact.
B) management.
C) lock granularity.
D) none of the above.
سؤال
A(n)________ stores metadata about an organization's data and data processing resources.

A) DBA
B) information repository
C) organizational system catalog
D) data dictionary
سؤال
An optimistic approach to concurrency control is called:

A) versioning.
B) denormalization.
C) deadlock resolution.
D) none of the above.
سؤال
The preferred method of fixing an aborted transaction is:

A) repairing the schema.
B) switching.
C) duplication of data.
D) backing out the transaction.
سؤال
A device to measure or detect fingerprints or signatures is called a(n)________ device.

A) biometric
B) view
C) ink
D) laser
سؤال
When incorrect data have been introduced,the database is best recovered by:

A) backward recovery, if the error has been discovered soon enough.
B) human intervention for only a few errors.
C) restarting from the most recent checkpoint and processing subsequent transactions.
D) all of the above.
سؤال
An audit trail of database changes is kept by a:

A) change control device.
B) subschema.
C) before image.
D) journalizing facility.
سؤال
A repository of information about a database that documents data elements of a database is called a:

A) schema.
B) subschema.
C) view.
D) data dictionary.
سؤال
A(n)________ prevents another transaction from reading and therefore updating a record until it is unlocked.

A) record controller
B) exclusive lock
C) authorization rule
D) shared lock
سؤال
A discrete unit of work that must be processed completely or not at all within a computer system is called a:

A) change control device.
B) transaction.
C) before image.
D) journalizing facility.
سؤال
A(n)________ is submitted by a DBA to test the current performance of a database or predict the response time for queries.

A) Elusive query
B) Performance test
C) Heartbeat query
D) None of the above
سؤال
There are two principal types of authorization tables: one for subjects and one for facts.
سؤال
Specifications for transactions do not need to be reviewed quickly.
سؤال
A trigger can be used for security purposes to prohibit inappropriate actions,such as changing a salary value outside of a business day.
سؤال
The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.
سؤال
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
سؤال
The transaction log contains before- and after-images of records that have been modified.
سؤال
With a one-key encryption standard,both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.
سؤال
A domain is a way to create a structure that acts like a table.
سؤال
The role of database administration is typically a more hands-on,physical involvement with the management of databases.
سؤال
Open-source software always comes with complete documentation.
سؤال
Databases are generally the property of a single department within an organization.
سؤال
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.
سؤال
The first line of defense for authentication is the use of passwords,which is a one-factor authentication scheme.
سؤال
A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities,journalizing facilities,and a recovery manager.
سؤال
A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes.
سؤال
A view can be built to present only the data to which a user requires access.
سؤال
Loss of data integrity does not impact the quality of data in a database.
سؤال
The data administrator takes responsibility for the overall management of data resources.
سؤال
Three-factor authentication is most often implemented with a credit card.
سؤال
Database applications are not very disk intensive.
سؤال
The repository information model defines types,which should be easy to extend.
سؤال
The Information Resource Lexicon System (IRLS)is a computer software tool used to manage and control access to the information repository.
سؤال
A DBMS may perform checkpoints automatically or in response to commands in user application programs.
سؤال
A typical cause of database destruction is a disk crash.
سؤال
A business transaction is a sequence of steps that constitute some well-defined business activity.
سؤال
Correct installation of the DBMS product is essential to any environment.
سؤال
Backward recovery starts with an earlier copy of the database.
سؤال
In order to perform a restore/rerun,the database must be mirrored.
سؤال
Field-level locks are used quite often.
سؤال
Examination and modification of the SQL code in an application may lead to performance improvements.
سؤال
Concurrent transactions need to be processed in isolation so that they do not interfere with each other.
سؤال
Versioning takes the pessimistic approach to locking.
سؤال
CASE tool-generated information should be fed into repositories.
سؤال
The granularity of locking is not a critical decision in database design.
سؤال
Allocating 10 percent over suggested installation space is sufficient for a DBMS.
سؤال
A repository of information about data is called a catalog.
سؤال
A deadlock results when two transactions try to read the same record.
سؤال
Two-phase locking results in a growing phase where locks are acquired and a shrinking phase where locks are released.
سؤال
A shared lock allows other transactions to read but not update records in use.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/116
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Data and Database Administration
1
The W3C standard for Web privacy is called:

A) The Web privacy act.
B) Platform for Privacy Preferences.
C) Freedom of Web Information Act.
D) The Magna Carta.
B
2
Which of the following is a principal type of authorization table?

A) Subject
B) Transaction
C) View
D) Index
A
3
An open-source DBMS is:

A) a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
B) a beta release of a commercial RDBMS.
C) an object-oriented database management system.
D) source code for a commercial RDBMS.
A
4
An organization should have one data warehouse administrator for every:

A) 100 users.
B) 100 gigabytes of data in the enterprise data warehouse.
C) department.
D) processor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
5
While views promote security by restricting user access to data,they are not adequate security measures because:

A) an unauthorized person may gain access to a view through experimentation.
B) all users can read any view.
C) a view's data does not change.
D) none of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
6
Guidelines for server security should include all of the following EXCEPT:

A) securing the network between client and server.
B) guidelines for password lengths.
C) password naming conventions.
D) guidelines for frequency of password changes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is a type of network security:

A) authentication of the client workstation.
B) password naming conventions.
C) guidelines for frequency of password changes.
D) all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following functions do cost/benefit models?

A) Database planning
B) Database analysis
C) Database design
D) Operations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following threats involves outside parties using information to embarrass a company?

A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following skills are required of a database administrator?

A) Broad technical background
B) Solid understanding of hardware architectures
C) Managerial skills
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is true of poor data and/or database administration?

A) Data timing problems
B) Multiple entity definitions
C) Unknown meanings of stored data
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following characteristics is required of a data administration manager?

A) Good people skills
B) Sufficient technical skills
C) Ability to sell users on ideas
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
13
________ is a technical function responsible for database design,security,and disaster recovery.

A) Data administration
B) Database administration
C) Tech support
D) Operations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
14
Controls designed to restrict access and activities are called:

A) schemas.
B) business rules.
C) encryption controls.
D) authorization rules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
15
An information repository supplies information to:

A) users.
B) automated CASE tools.
C) database management systems.
D) all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
16
A data warehouse administrator has which of the following responsibilities?

A) Build and administer an environment supportive of decision-support applications
B) Build a stable architecture for the data warehouse
C) Develop service level agreements with suppliers and consumers of data for the data warehouse
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
17
Security measures for dynamic Web pages are different from static HTML pages because:

A) dynamic Web pages are built "on the fly".
B) static Web pages contain more sensitive data.
C) the connection requires full access to the database for dynamic pages.
D) all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
18
A trigger can be used as a security measure in which of the following ways?

A) To prohibit inappropriate actions
B) To cause special handling procedures to be executed
C) To cause a row to be written to a log file
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following functions develop integrity controls?

A) Database planning
B) Database analysis
C) Database implementation
D) Database design
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following functions model business rules?

A) Database planning
B) Database analysis
C) Database design
D) Operations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is not a component of a repository system architecture?

A) An informational model
B) The repository engine
C) A data transformation process
D) The repository database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
22
Forward recovery is faster than restore/rerun because:

A) transactions do not have to be repeated.
B) security can be avoided.
C) images are mirrored.
D) systems are more complete.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
23
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store,process and output electronic data in a secure manner is called a(n):

A) smart chip.
B) smart card.
C) e-credit card.
D) secure card.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
24
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.

A) logging
B) concurrency control
C) transaction authorization
D) multiple management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
25
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.

A) backup facility
B) recovery manager
C) restart facility
D) transaction logger
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following functions are supported by a repository engine?

A) Object management
B) Relationship management
C) Version management
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
27
________ is used to undo unwanted database changes.

A) Rollback
B) Rollforward
C) Restart
D) Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is NOT an area of concern when trying to maintain a well-tuned database?

A) Memory usage
B) CPU usage
C) Input/output contention
D) User interface design
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
29
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:

A) checkpoint facility.
B) backup facility.
C) recovery manager.
D) database change log.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
30
A(n)________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

A) record controller
B) exclusive lock
C) authorization rule
D) two-phase lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
31
The extent of the database resource that is included with each lock is called the level of:

A) impact.
B) management.
C) lock granularity.
D) none of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
32
A(n)________ stores metadata about an organization's data and data processing resources.

A) DBA
B) information repository
C) organizational system catalog
D) data dictionary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
33
An optimistic approach to concurrency control is called:

A) versioning.
B) denormalization.
C) deadlock resolution.
D) none of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
34
The preferred method of fixing an aborted transaction is:

A) repairing the schema.
B) switching.
C) duplication of data.
D) backing out the transaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
35
A device to measure or detect fingerprints or signatures is called a(n)________ device.

A) biometric
B) view
C) ink
D) laser
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
36
When incorrect data have been introduced,the database is best recovered by:

A) backward recovery, if the error has been discovered soon enough.
B) human intervention for only a few errors.
C) restarting from the most recent checkpoint and processing subsequent transactions.
D) all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
37
An audit trail of database changes is kept by a:

A) change control device.
B) subschema.
C) before image.
D) journalizing facility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
38
A repository of information about a database that documents data elements of a database is called a:

A) schema.
B) subschema.
C) view.
D) data dictionary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
39
A(n)________ prevents another transaction from reading and therefore updating a record until it is unlocked.

A) record controller
B) exclusive lock
C) authorization rule
D) shared lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
40
A discrete unit of work that must be processed completely or not at all within a computer system is called a:

A) change control device.
B) transaction.
C) before image.
D) journalizing facility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
41
A(n)________ is submitted by a DBA to test the current performance of a database or predict the response time for queries.

A) Elusive query
B) Performance test
C) Heartbeat query
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
42
There are two principal types of authorization tables: one for subjects and one for facts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
43
Specifications for transactions do not need to be reviewed quickly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
44
A trigger can be used for security purposes to prohibit inappropriate actions,such as changing a salary value outside of a business day.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
45
The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
46
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
47
The transaction log contains before- and after-images of records that have been modified.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
48
With a one-key encryption standard,both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
49
A domain is a way to create a structure that acts like a table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
50
The role of database administration is typically a more hands-on,physical involvement with the management of databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
51
Open-source software always comes with complete documentation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
52
Databases are generally the property of a single department within an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
53
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
54
The first line of defense for authentication is the use of passwords,which is a one-factor authentication scheme.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
55
A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities,journalizing facilities,and a recovery manager.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
56
A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
57
A view can be built to present only the data to which a user requires access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
58
Loss of data integrity does not impact the quality of data in a database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
59
The data administrator takes responsibility for the overall management of data resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
60
Three-factor authentication is most often implemented with a credit card.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
61
Database applications are not very disk intensive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
62
The repository information model defines types,which should be easy to extend.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
63
The Information Resource Lexicon System (IRLS)is a computer software tool used to manage and control access to the information repository.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
64
A DBMS may perform checkpoints automatically or in response to commands in user application programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
65
A typical cause of database destruction is a disk crash.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
66
A business transaction is a sequence of steps that constitute some well-defined business activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
67
Correct installation of the DBMS product is essential to any environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
68
Backward recovery starts with an earlier copy of the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
69
In order to perform a restore/rerun,the database must be mirrored.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
70
Field-level locks are used quite often.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
71
Examination and modification of the SQL code in an application may lead to performance improvements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
72
Concurrent transactions need to be processed in isolation so that they do not interfere with each other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
73
Versioning takes the pessimistic approach to locking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
74
CASE tool-generated information should be fed into repositories.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
75
The granularity of locking is not a critical decision in database design.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
76
Allocating 10 percent over suggested installation space is sufficient for a DBMS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
77
A repository of information about data is called a catalog.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
78
A deadlock results when two transactions try to read the same record.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
79
Two-phase locking results in a growing phase where locks are acquired and a shrinking phase where locks are released.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
80
A shared lock allows other transactions to read but not update records in use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.