Deck 8: Database Administration

ملء الشاشة (f)
exit full mode
سؤال
The command 'REVOKE REFERENCES ON Customer to bsmith' prevents the bsmith user from using the ALTER TABLE statement to change a table definition.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The ability of a DBMS to allow multiple computers to share access to data and software by running multiple instances of a single, shared database is called a serial database system.
سؤال
QBE is an example of a procedural language.
سؤال
All database users need full access to all tables and fields in the database.
سؤال
Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may be locked and are exclusive locks the only ones permitted?

A) Concurrent update
B) Data recovery
C) Data dictionary
D) Security
سؤال
Which DBA role organizes metadata, and acts as a liaison between the database administrator and the rest of the database staff?

A) data architect
B) database programmer
C) data administrator
D) data operations manager
سؤال
A shared lock permits other users to read the data in the database.
سؤال
When selecting a DBMS and evaluating the data definitions category, you should ask if the DBMS supports views.
سؤال
Which DBA role manages or supervises the construction of large and comprehensive databases?

A) data architect
B) database programmer
C) data administrator
D) data operations manager
سؤال
When selecting a DBMS and evaluating the concurrent update category, you should determine whether the DBMS resolves deadlock.
سؤال
When selecting a DBMS, the only database model choice available to the DBA is the relational model.
سؤال
The DBA is responsible for DBMS maintenance, data dictionary management, and training.
سؤال
The DBA determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog.
سؤال
Programmers monitor database usage to detect potential security violations.
سؤال
Which DBA role makes sure the data gets from one place to another with integrity and security?

A) data architect
B) database programmer
C) data administrator
D) data operations manager
سؤال
To manage problems that arise from using a DBMS, companies appoint a DBA to manage both the database and the use of the DBMS.
سؤال
If a user is granted the use of the SELECT statement on a table, the user is also authorized to use UPDATE statements even if the user was not specifically granted that permission.
سؤال
The data architect designs, builds, and deploys databases.
سؤال
What type of locks forbid any other user from accessing the data in any way?

A) Shared
B) Exclusive
C) Limited
D) Concurrent
سؤال
The data architect sets data-handling policies and assigns data entry.
سؤال
What is it called when a 2-step identity verification procedure is used to grant users access to the system?

A) smart card authorization
B) multilayer security
C) security in depth
D) two-factor authentication
سؤال
If performance testing shows that queries based on frequently accessed fields are taking a long time to complete, what can the DBA do that might improve performance?

A) increase the number of columns
B) delete foreign keys
C) add indexes
D) add alternate keys
سؤال
The ____________________ recovery plan specifies the ongoing and emergency actions and procedures required to ensure data availability if a disaster occurs.
سؤال
DBAs should have an understanding of information legislation such as the Data ____________________ Act.
سؤال
The database ____________________ manager is concerned with the ongoing maintenance of established databases.
سؤال
Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time?

A) Concurrent update
B) Security
C) Integrity
D) Limitations
سؤال
After the database designers complete the information-level design, what design level does the DBA do next?

A) physical
B) information
C) logical
D) graphical
سؤال
When evaluating and selecting a DBMS, in which category is the DBA most concerned with benchmarks?

A) Cost
B) Security
C) Integrity
D) Performance
سؤال
What is it called when a database is divided into segments and the segments are stored on different computers?

A) converged database
B) centralized database
C) distributed database
D) virtual database
سؤال
What type of environment do database programmers use to develop new programs and modify existing programs?

A) live
B) sandbox
C) production
D) virtual
سؤال
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas?

A) Backup and recovery
B) Security
C) Integrity
D) Replication and distributed databases
سؤال
If users access only certain fields in a table, how can you improve performance?

A) by splitting the table into two or more tables and removing the primary key
B) by combining the table with another table that performs better
C) by splitting the table into two or more tables that each has the same primary key as the original
D) by adding indexes to each column and deleting the primary and alternate keys
سؤال
Which process converts a table that is in third normal form to a table no longer in third normal form?

A) conversion
B) denormalizing
C) normalization
D) replication
سؤال
A(n) ____________________ site is a backup site that an organization can switch to in minutes or hours because the site is completely equipped with duplicate hardware, software, and data.
سؤال
Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export?

A) Cost
B) Future plans
C) Portability
D) Performance
سؤال
What can organizations use in their computer systems that allow the system to continue to process database transactions after a hard drive failure?

A) UPS
B) backup
C) RAID
D) surge suppressor
سؤال
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS support encryption, password support, and authorization rules?

A) Concurrent update
B) Security
C) Integrity
D) Limitations
سؤال
A(n) ____________________ site is a backup site that is equipped with duplicate hardware and software but not data.
سؤال
Which group performs additional testing of the database program after the programmers complete their testing?

A) customers
B) accounting
C) users
D) quality assurance
سؤال
Which of the following is a log of all database maintenance, with dates, license keys, issues or updates, involved personnel, and resolutions?

A) system journal
B) run-book
C) system catalog
D) DBMS log
سؤال
When the primary key cannot be null, this is known as ____________________.
سؤال
What is the DBA's role with regard to access privileges?
سؤال
The data ____________________ is the catalog, but it often contains a wider range of information, including information about tables, fields, indexes, programs, and users.
سؤال
An ____________________ is an internal company network that uses software tools typically used on the Internet and the World Wide Web.
سؤال
Database ____________________ deals with the ability of the production system to serve users in a timely and responsive manner.
سؤال
Discuss the steps that organizations take to protect their data against hard drive failures and electrical power interruptions or outages.
سؤال
In a LAN, support for ____________________ update is very important because many users might be updating the database at the same time.
سؤال
What can the DBA do if the organization has no additional money for its production system but needs further performance improvements?
سؤال
With just two exceptions, the DBA grants access and update privileges to the production system only to authorized users. What are the exceptions?
سؤال
Describe a parallel database system.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Database Administration
1
The command 'REVOKE REFERENCES ON Customer to bsmith' prevents the bsmith user from using the ALTER TABLE statement to change a table definition.
False
2
The ability of a DBMS to allow multiple computers to share access to data and software by running multiple instances of a single, shared database is called a serial database system.
False
3
QBE is an example of a procedural language.
False
4
All database users need full access to all tables and fields in the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may be locked and are exclusive locks the only ones permitted?

A) Concurrent update
B) Data recovery
C) Data dictionary
D) Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which DBA role organizes metadata, and acts as a liaison between the database administrator and the rest of the database staff?

A) data architect
B) database programmer
C) data administrator
D) data operations manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
A shared lock permits other users to read the data in the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
When selecting a DBMS and evaluating the data definitions category, you should ask if the DBMS supports views.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which DBA role manages or supervises the construction of large and comprehensive databases?

A) data architect
B) database programmer
C) data administrator
D) data operations manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
When selecting a DBMS and evaluating the concurrent update category, you should determine whether the DBMS resolves deadlock.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
When selecting a DBMS, the only database model choice available to the DBA is the relational model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
The DBA is responsible for DBMS maintenance, data dictionary management, and training.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
The DBA determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Programmers monitor database usage to detect potential security violations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which DBA role makes sure the data gets from one place to another with integrity and security?

A) data architect
B) database programmer
C) data administrator
D) data operations manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
To manage problems that arise from using a DBMS, companies appoint a DBA to manage both the database and the use of the DBMS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
If a user is granted the use of the SELECT statement on a table, the user is also authorized to use UPDATE statements even if the user was not specifically granted that permission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
The data architect designs, builds, and deploys databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
What type of locks forbid any other user from accessing the data in any way?

A) Shared
B) Exclusive
C) Limited
D) Concurrent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
The data architect sets data-handling policies and assigns data entry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
What is it called when a 2-step identity verification procedure is used to grant users access to the system?

A) smart card authorization
B) multilayer security
C) security in depth
D) two-factor authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
If performance testing shows that queries based on frequently accessed fields are taking a long time to complete, what can the DBA do that might improve performance?

A) increase the number of columns
B) delete foreign keys
C) add indexes
D) add alternate keys
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
The ____________________ recovery plan specifies the ongoing and emergency actions and procedures required to ensure data availability if a disaster occurs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
DBAs should have an understanding of information legislation such as the Data ____________________ Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
The database ____________________ manager is concerned with the ongoing maintenance of established databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time?

A) Concurrent update
B) Security
C) Integrity
D) Limitations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
After the database designers complete the information-level design, what design level does the DBA do next?

A) physical
B) information
C) logical
D) graphical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
When evaluating and selecting a DBMS, in which category is the DBA most concerned with benchmarks?

A) Cost
B) Security
C) Integrity
D) Performance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
What is it called when a database is divided into segments and the segments are stored on different computers?

A) converged database
B) centralized database
C) distributed database
D) virtual database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
What type of environment do database programmers use to develop new programs and modify existing programs?

A) live
B) sandbox
C) production
D) virtual
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas?

A) Backup and recovery
B) Security
C) Integrity
D) Replication and distributed databases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
If users access only certain fields in a table, how can you improve performance?

A) by splitting the table into two or more tables and removing the primary key
B) by combining the table with another table that performs better
C) by splitting the table into two or more tables that each has the same primary key as the original
D) by adding indexes to each column and deleting the primary and alternate keys
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which process converts a table that is in third normal form to a table no longer in third normal form?

A) conversion
B) denormalizing
C) normalization
D) replication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
A(n) ____________________ site is a backup site that an organization can switch to in minutes or hours because the site is completely equipped with duplicate hardware, software, and data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export?

A) Cost
B) Future plans
C) Portability
D) Performance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
What can organizations use in their computer systems that allow the system to continue to process database transactions after a hard drive failure?

A) UPS
B) backup
C) RAID
D) surge suppressor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS support encryption, password support, and authorization rules?

A) Concurrent update
B) Security
C) Integrity
D) Limitations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
A(n) ____________________ site is a backup site that is equipped with duplicate hardware and software but not data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which group performs additional testing of the database program after the programmers complete their testing?

A) customers
B) accounting
C) users
D) quality assurance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following is a log of all database maintenance, with dates, license keys, issues or updates, involved personnel, and resolutions?

A) system journal
B) run-book
C) system catalog
D) DBMS log
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
When the primary key cannot be null, this is known as ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is the DBA's role with regard to access privileges?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
The data ____________________ is the catalog, but it often contains a wider range of information, including information about tables, fields, indexes, programs, and users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
An ____________________ is an internal company network that uses software tools typically used on the Internet and the World Wide Web.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Database ____________________ deals with the ability of the production system to serve users in a timely and responsive manner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Discuss the steps that organizations take to protect their data against hard drive failures and electrical power interruptions or outages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
In a LAN, support for ____________________ update is very important because many users might be updating the database at the same time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What can the DBA do if the organization has no additional money for its production system but needs further performance improvements?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
With just two exceptions, the DBA grants access and update privileges to the production system only to authorized users. What are the exceptions?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Describe a parallel database system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.