Deck 8: Database Administration

ملء الشاشة (f)
exit full mode
سؤال
To protect an organization's data against physical damage,the DBA creates and implements backup and recovery procedures as part of a disaster recovery plan.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
When a company decides to purchase a new DBMS,the CEO leads the DBMS evaluation and selection effort.
سؤال
Management approval is not required before the security policies and procedures can be implemented.
سؤال
The DBA is responsible for DBMS maintenance,data dictionary management,and training.
سؤال
If a DBMS lacks essential security features,the DBA might create or purchase special security programs that provide the missing features.
سؤال
Programmers monitor database usage to detect potential security violations.
سؤال
Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may be locked and are exclusive locks the only ones permitted?

A)Concurrent update
B)Data recovery
C)Data dictionary
D)Security
سؤال
Another term for production system is the sandbox.
سؤال
The ____ determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog to ensure that users access the database only in ways in which they are entitled to do so.

A)CEO
B)programmer
C)DBA
D)IT manager
سؤال
An internal company network that uses software tools typically used on the Internet and World Wide Web is called a virtual network.
سؤال
SQL is an example of a procedural language.
سؤال
Damage to a database can occur through a physical incident such as a computer malfunction.
سؤال
To implement and enforce security,the DBA uses such features as journaling and metadata.
سؤال
QBE is an example of a nonprocedural language.
سؤال
____ locks forbid any other user from accessing the data in any way.

A)Shared
B)Exclusive
C)Limited
D)Concurrent
سؤال
Any changes made in the database structure are communicated only to the affected users.
سؤال
A shared lock permits other users to read the data in the database.
سؤال
A ____ is a place where a record of certain corporate data is kept.

A)depository
B)data archive
C)storage
D)data bank
سؤال
Which of the following DBMS evaluation categories does the following question relate to: Is it a simple catalog or can it contain more content,such as information about programs and the various data items these programs access?

A)Backup and recovery
B)Data dictionary
C)Security
D)Integrity
سؤال
The DBA determines and documents the database access privileges for all users.
سؤال
After the DBMS is purchased,the ____ has primary responsibility for installation and maintenance.

A)IT manager
B)DBA
C)CEO
D)user
سؤال
By default,Access and other DBMSs create indexes automatically for the ____ keys.

A)primary and minor
B)alternate and foreign
C)secondary and alternate
D)primary and foreign
سؤال
Changing the database design to improve the performance is called ____ the design.

A)tending
B)focusing
C)tuning
D)modifying
سؤال
____________________ is the prevention of unauthorized access,either intentional or accidental,to a database.
سؤال
____ integrity is the constraint that says that the values in foreign keys must match values already in the database.

A)Parallel
B)Relational
C)Conditional
D)Referential
سؤال
Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time?

A)Concurrent update
B)Security
C)Integrity
D)Limitations
سؤال
____________________ is the rule that the primary key cannot be null.
سؤال
After the database designers complete the information-level design,the DBA does the ____-level design.

A)physical
B)information
C)logical
D)graphical
سؤال
The ____________________ Act of 2002 is a federal law that specifies data retention and verification requirements for public companies,requires CEOs and CFOs to certify financial statements,and makes it a crime to tamper with financial records.
سؤال
In order to develop new programs,the programmers need access to the information in the DBMS. They are given access to the ____.

A)production system
B)test system
C)live system
D)documentation system
سؤال
____ converts a table that is in third normal form to a table no longer in third normal form.

A)Conversion
B)Denormalization
C)Normalization
D)Replication
سؤال
To protect against electrical power interruptions and outages,organizations use a(n) ____________________,which is a power source such as battery or fuel cell.
سؤال
The ____ is responsible for providing training in the use of the DBMS.

A)programmer
B)analyst
C)DBA
D)CEO
سؤال
Tables with indexes allow faster searches,but slower performance on ____.

A)queries
B)reports
C)updates
D)selects
سؤال
The ____ establishes the naming conventions for tables,fields,and indexes in the data dictionary.

A)user
B)DBMS
C)DBA
D)programmer
سؤال
Which of the following DBMS evaluation categories does the following question relate to: Does the vendor of the DBMS supply printed or online training manuals and how good are the manuals?

A)Portability
B)Performance
C)Cost
D)Documentation and training
سؤال
Which of the following DBMS evaluation categories does the following question relate to: On what operating system and hardware is the DBMS supported?

A)Concurrent update
B)Security
C)Integrity
D)Limitations
سؤال
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas?

A)Backup and recovery
B)Security
C)Integrity
D)Replication and distributed databases
سؤال
Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export?

A)Cost
B)Future plans
C)Portability
D)Performance
سؤال
The DBA uses views and the SQL ____________________ statement as two security mechanisms.
سؤال
With just two exceptions,the DBA grants access and update privileges to the production system only to authorized users. What are the exceptions?
سؤال
A configuration of several computers connected together that allow users to share a variety of hardware and software resources is known as a(n) ____________________.
سؤال
If users access only certain fields in a table,you can improve performance by ____________________ the tables into two or more tables that each have the same primary key as the original and that collectively contain all the fields from the original table.
سؤال
The ____________________ strictly controls the production system.
سؤال
____________________ help means that if a user is having trouble and asks for help,the DBMS will provide assistance for the particular feature being used at the time the user asks for help.
سؤال
What is the DBA's role with regard to access privileges?
سؤال
What can the DBA do if the organization has no additional money for its production system but needs further performance improvements?
سؤال
What is a hot site? What is a warm site? What is the difference between the two?
سؤال
The hardware,software,and database for the users is called the ____________________ system.
سؤال
Discuss the steps that organizations take to protect their data against hard drive failures and electrical power interruptions or outages.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Database Administration
1
To protect an organization's data against physical damage,the DBA creates and implements backup and recovery procedures as part of a disaster recovery plan.
True
2
When a company decides to purchase a new DBMS,the CEO leads the DBMS evaluation and selection effort.
False
3
Management approval is not required before the security policies and procedures can be implemented.
False
4
The DBA is responsible for DBMS maintenance,data dictionary management,and training.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
If a DBMS lacks essential security features,the DBA might create or purchase special security programs that provide the missing features.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Programmers monitor database usage to detect potential security violations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may be locked and are exclusive locks the only ones permitted?

A)Concurrent update
B)Data recovery
C)Data dictionary
D)Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Another term for production system is the sandbox.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
The ____ determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog to ensure that users access the database only in ways in which they are entitled to do so.

A)CEO
B)programmer
C)DBA
D)IT manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
An internal company network that uses software tools typically used on the Internet and World Wide Web is called a virtual network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
SQL is an example of a procedural language.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Damage to a database can occur through a physical incident such as a computer malfunction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
To implement and enforce security,the DBA uses such features as journaling and metadata.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
QBE is an example of a nonprocedural language.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ locks forbid any other user from accessing the data in any way.

A)Shared
B)Exclusive
C)Limited
D)Concurrent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Any changes made in the database structure are communicated only to the affected users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
A shared lock permits other users to read the data in the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
A ____ is a place where a record of certain corporate data is kept.

A)depository
B)data archive
C)storage
D)data bank
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following DBMS evaluation categories does the following question relate to: Is it a simple catalog or can it contain more content,such as information about programs and the various data items these programs access?

A)Backup and recovery
B)Data dictionary
C)Security
D)Integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
The DBA determines and documents the database access privileges for all users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
After the DBMS is purchased,the ____ has primary responsibility for installation and maintenance.

A)IT manager
B)DBA
C)CEO
D)user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
By default,Access and other DBMSs create indexes automatically for the ____ keys.

A)primary and minor
B)alternate and foreign
C)secondary and alternate
D)primary and foreign
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Changing the database design to improve the performance is called ____ the design.

A)tending
B)focusing
C)tuning
D)modifying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
____________________ is the prevention of unauthorized access,either intentional or accidental,to a database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
____ integrity is the constraint that says that the values in foreign keys must match values already in the database.

A)Parallel
B)Relational
C)Conditional
D)Referential
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time?

A)Concurrent update
B)Security
C)Integrity
D)Limitations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
____________________ is the rule that the primary key cannot be null.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
After the database designers complete the information-level design,the DBA does the ____-level design.

A)physical
B)information
C)logical
D)graphical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
The ____________________ Act of 2002 is a federal law that specifies data retention and verification requirements for public companies,requires CEOs and CFOs to certify financial statements,and makes it a crime to tamper with financial records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
In order to develop new programs,the programmers need access to the information in the DBMS. They are given access to the ____.

A)production system
B)test system
C)live system
D)documentation system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
____ converts a table that is in third normal form to a table no longer in third normal form.

A)Conversion
B)Denormalization
C)Normalization
D)Replication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
To protect against electrical power interruptions and outages,organizations use a(n) ____________________,which is a power source such as battery or fuel cell.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
The ____ is responsible for providing training in the use of the DBMS.

A)programmer
B)analyst
C)DBA
D)CEO
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Tables with indexes allow faster searches,but slower performance on ____.

A)queries
B)reports
C)updates
D)selects
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
The ____ establishes the naming conventions for tables,fields,and indexes in the data dictionary.

A)user
B)DBMS
C)DBA
D)programmer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following DBMS evaluation categories does the following question relate to: Does the vendor of the DBMS supply printed or online training manuals and how good are the manuals?

A)Portability
B)Performance
C)Cost
D)Documentation and training
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following DBMS evaluation categories does the following question relate to: On what operating system and hardware is the DBMS supported?

A)Concurrent update
B)Security
C)Integrity
D)Limitations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas?

A)Backup and recovery
B)Security
C)Integrity
D)Replication and distributed databases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export?

A)Cost
B)Future plans
C)Portability
D)Performance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
The DBA uses views and the SQL ____________________ statement as two security mechanisms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
With just two exceptions,the DBA grants access and update privileges to the production system only to authorized users. What are the exceptions?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
A configuration of several computers connected together that allow users to share a variety of hardware and software resources is known as a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
If users access only certain fields in a table,you can improve performance by ____________________ the tables into two or more tables that each have the same primary key as the original and that collectively contain all the fields from the original table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
The ____________________ strictly controls the production system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
____________________ help means that if a user is having trouble and asks for help,the DBMS will provide assistance for the particular feature being used at the time the user asks for help.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What is the DBA's role with regard to access privileges?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What can the DBA do if the organization has no additional money for its production system but needs further performance improvements?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What is a hot site? What is a warm site? What is the difference between the two?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
The hardware,software,and database for the users is called the ____________________ system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Discuss the steps that organizations take to protect their data against hard drive failures and electrical power interruptions or outages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.