Deck 8: Physical Database Design and Database Infrastructure

Full screen (f)
exit full mode
Question
While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the:

A) user.
B) CEO.
C) XML.
D) operating system.
Use Space or
up arrow
down arrow
to flip the card.
Question
A requirement to begin designing physical files and databases is:

A) normalized relations.
B) physical tables created.
C) implementation complete.
D) all datatypes determined.
Question
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space.

A) query design
B) programmer productivity
C) data integrity
D) data integration
Question
Database access frequencies are estimated from:

A) transaction volumes.
B) user logins.
C) security violations.
D) random number generation.
Question
In which data model would a code table appear?

A) Conceptual
B) Logical
C) Physical
D) Data layout
Question
A method for handling missing data is to:

A) substitute with random numbers for the missing data.
B) track missing data with special reports.
C) perform insensitivity testing.
D) delete the associated row.
Question
Sensitivity testing involves:

A) checking to see if your teeth hurt when you brush.
B) seeing how accurate data are.
C) checking to see if missing data will greatly impact results.
D) deleting the associated row.
Question
An integrity control supported by a DBMS is:

A) substitute estimates.
B) security.
C) range control.
D) GUI guards.
Question
A key decision in the physical design process is:

A) ignoring the size of the database.
B) selecting structures.
C) deciding on the monitor.
D) deciding the e-r diagrams.
Question
Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n):

A) extent.
B) table.
C) tablespace.
D) partition.
Question
The smallest unit of application data recognized by system software is a:

A) field.
B) row.
C) data type.
D) column.
Question
Designing physical files requires ________ of where and when data are used in various ways.

A) maps
B) descriptions
C) keys
D) hints
Question
A contiguous section of disk storage space is called a(n):

A) track.
B) sector.
C) extent.
D) tablespace.
Question
All of the following are objectives when selecting a data type EXCEPT:

A) represent all possible values.
B) improve data integrity.
C) support all data manipulations.
D) use a lot of storage space.
Question
The value a field will assume unless the user enters an explicit value for an instance of that field is called a:

A) default value.
B) null value.
C) range control.
D) gurand.
Question
A detailed coding scheme recognized by system software for representing organizational data is called a(n):

A) DBMS code.
B) data type.
C) SQL.
D) DB layout.
Question
Which of the following is an objective of selecting a data type?

A) Represent a small number of possible values
B) Maximize storage space
C) Limit security
D) Improve data integrity
Question
An appropriate datatype for one wanting a fixed-length type for last name would include:

A) VARCHAR.
B) CHAR.
C) BLOB.
D) DATE.
Question
All of the following are valid datatypes in Oracle 12c EXCEPT:

A) VARCHAR2.
B) BOOLEAN.
C) BLOB.
D) NUMBER.
Question
An appropriate datatype for adding a sound clip would be:

A) VARCHAR.
B) CHAR.
C) BLOB.
D) DATE.
Question
A method to allow adjacent secondary memory space to contain rows from several tables is called:

A) cluttering.
B) clustering.
C) concatenating.
D) compiling.
Question
A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers, and join tables to prepare query results is the:

A) explain plan.
B) show optimization.
C) explain query.
D) analyze query.
Question
A(n) ________ is a field of data used to locate a related field or record.

A) key
B) index
C) lock
D) pointer
Question
In most cases, the goal of ________ dominates the design process.

A) efficient data processing
B) security
C) quick pointer updates
D) shorter design times
Question
Horizontal partitioning makes sense:

A) when different categories of a table's rows are processed separately.
B) when less security is needed.
C) when partitions must be organized the same.
D) when only one category is allowed.
Question
An index on columns from two or more tables that come from the same domain of values is called a:

A) bitmap index.
B) multivalued index.
C) join index.
D) transaction index.
Question
Which type of file is easiest to update?

A) Sequential
B) Hashed
C) Indexed
D) Clustered
Question
A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices.

A) physical pointer
B) retrieval program
C) file organization
D) update program
Question
All of the following are common denormalization opportunities EXCEPT:

A) two entities with a one-to-one relationship.
B) a one-to-many relationship.
C) a many-to-many relationship with nonkey attributes.
D) reference data.
Question
An advantage of partitioning is:

A) efficiency.
B) remote optimization.
C) extra space and update time.
D) increase redundancy.
Question
A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called:

A) multiple partition queries.
B) perpendicular query processing.
C) parallel query processing.
D) query optimization.
Question
A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a:

A) hashed file organization.
B) hash key.
C) multi-indexed file organization.
D) hash index table.
Question
A(n) ________ is a routine that converts a primary key value into a record address.

A) record index calculator
B) index pointer program
C) hashing algorithm
D) pointing algorithm
Question
A factor to consider when choosing a file organization is:

A) inefficient data retrieval.
B) DDL.
C) efficient storage.
D) DML.
Question
A disadvantage of partitioning is:

A) simplicity.
B) remote optimization.
C) extra space and update time.
D) shorter technology spans.
Question
Which type of file is most efficient with storage space?

A) Sequential
B) Hashed
C) Indexed
D) Clustered
Question
Distributing the rows of data into separate files is called:

A) normalization.
B) horizontal partitioning.
C) vertical partitioning.
D) file allocation.
Question
In which type of file is multiple key retrieval not possible?

A) Sequential
B) Hashed
C) Indexed
D) Clustered
Question
A file organization where files are not stored in any particular order is considered a:

A) hashed file organization.
B) hash key.
C) multi-indexed file organization.
D) heap file organization.
Question
One field or combination of fields for which more than one record may have the same combination of values is called a(n):

A) secondary key.
B) index.
C) composite key.
D) linked key.
Question
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:

A) checkpoint facility.
B) backup facility.
C) recovery manager.
D) database change log.
Question
A discrete unit of work that must be processed completely or not at all within a computer system is called a:

A) change control device.
B) transaction.
C) before image.
D) journalizing facility.
Question
Forward recovery is faster than restore/rerun because:

A) transactions do not have to be repeated.
B) security can be avoided.
C) images are mirrored.
D) systems are more complete.
Question
The preferred method of fixing an aborted transaction is:

A) repairing the schema.
B) switching.
C) duplication of data.
D) backing out the transaction.
Question
When incorrect data have been introduced, the database is best recovered by:

A) starting with a new ERD.
B) formatting server.
C) restarting from the most recent checkpoint and processing subsequent transactions.
D) reloading RDMS software.
Question
________ is used to undo unwanted database changes.

A) Rollback
B) Rollforward
C) Restart
D) Encryption
Question
Which of the following is a principal type of authorization table?

A) Subject
B) Transaction
C) View
D) Index
Question
While views promote security by restricting user access to data, they are not adequate security measures because:

A) an unauthorized person may gain access to a view through experimentation.
B) all users can read any view.
C) a view's data does not change.
D) views are not possible to create in most DBMS.
Question
The coding or scrambling of data so that humans cannot read them is called:

A) demarcation.
B) hiding.
C) encoding.
D) encryption.
Question
________ partitioning distributes the columns of a table into several separate physical records.

A) Horizontal
B) Crossways
C) Vertical
D) Final
Question
An audit trail of database changes is kept by a:

A) change control device.
B) subschema.
C) before image.
D) journalizing facility.
Question
Sarbanes-Oxley Act was enacted to ensure the integrity of:

A) SQL.
B) public companies' financial statements.
C) private companies' shareholders meetings.
D) Entity-Relationship Diagrams.
Question
Guidelines for server security should include all of the following EXCEPT:

A) securing the network between client and server.
B) guidelines for password lengths.
C) password naming conventions.
D) guidelines for frequency of password changes.
Question
Which of the following threats involves outside parties using information to embarrass a company?

A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
Question
A form of denormalization where the same data are purposely stored in multiple places in the database is called:

A) data duplication.
B) data replication.
C) advanced placement.
D) horizontal partitioning.
Question
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process, and output electronic data in a secure manner is called a(n):

A) smart chip.
B) smart card.
C) e-credit card.
D) secure card.
Question
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.

A) backup facility
B) recovery manager
C) restart facility
D) transaction logger
Question
Controls designed to restrict access and activities are called:

A) schemas.
B) business rules.
C) encryption controls.
D) authorization rules.
Question
A trigger can be used as a security measure in which of the following ways?

A) To check for viruses
B) To cause special handling procedures to be executed
C) To design a database
D) To conduct a DFD analysis
Question
A device to measure or detect fingerprints or signatures is called a(n) ________ device.

A) biometric
B) view
C) ink
D) laser
Question
The smallest unit of named application data is a record.
Question
A data management platform service is called:

A) Infrastructure-as-a-service.
B) Platform-as-a-service.
C) Software-as-a-service.
D) Database-as-a-service.
Question
A cloud computing approach in which the service consists mainly of hardware and systems software resources is called:

A) Infrastructure-as-a-service.
B) Platform-as-a-service.
C) Software-as-a-service.
D) IDE.
Question
All of the following are advantages to cloud-based computing EXCEPT:

A) no need for initial investment in hardware, physical facilities and systems software.
B) elasticity.
C) organizations can explore new data management technologies more easily.
D) ACID support for database as a service.
Question
Requirements for response time, data security, backup, and recovery are all requirements for physical design.
Question
The Number datatype would be appropriate for a zip code.
Question
With ________, the database itself is lost, destroyed, or cannot be read.

A) aborted transaction
B) database destruction
C) incorrect data
D) system failure
Question
The logical database design always forms the best foundation for grouping attributes in the physical design.
Question
SOX stands for the Sorbet-Oxford Act.
Question
A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called:

A) Software-as-a-service.
B) Platform-as-a-service.
C) Infrastructure-as-a-service.
D) Tools-as-a-service.
Question
A default value is the value that a field will always assume, regardless of what the user enters for an instance of that field.
Question
All of the following are disadvantages to cloud-based computing EXCEPT:

A) the promise of elasticity is not fulfilled because the model will not adapt to changing requirements.
B) live migration from one environment to another is a challenge.
C) DBaaS is still struggling to provide ACID properties of databases.
D) the visibility of costs of data management is better.
Question
Efficient database structures will be beneficial only if queries and the underlying database management system are tuned to properly use the structures.
Question
A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called:

A) Infrastructure-as-a-service.
B) Platform-as-a-service.
C) Software-as-a-service.
D) Soft-computing-service.
Question
A transaction that terminates abnormally is called a(n) ________ transaction.

A) terminated
B) aborted
C) completed
D) deleted
Question
One objective of selecting a data type is to minimize storage space.
Question
One decision in the physical design process is selecting structures.
Question
VarChar2 would be appropriate for a user that wanted a text datatype for LastName that would only consume the required space.
Question
All of the following are characteristics of cloud technologies EXCEPT:

A) unlimited bandwidth.
B) on-demand self-service IT capabilities.
C) broad network access.
D) rapid elasticity.
Question
Adding notations to the EER diagram regarding data volumes and usage is of no value to the physical design process.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/167
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Physical Database Design and Database Infrastructure
1
While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the:

A) user.
B) CEO.
C) XML.
D) operating system.
D
2
A requirement to begin designing physical files and databases is:

A) normalized relations.
B) physical tables created.
C) implementation complete.
D) all datatypes determined.
A
3
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space.

A) query design
B) programmer productivity
C) data integrity
D) data integration
C
4
Database access frequencies are estimated from:

A) transaction volumes.
B) user logins.
C) security violations.
D) random number generation.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
5
In which data model would a code table appear?

A) Conceptual
B) Logical
C) Physical
D) Data layout
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
6
A method for handling missing data is to:

A) substitute with random numbers for the missing data.
B) track missing data with special reports.
C) perform insensitivity testing.
D) delete the associated row.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
7
Sensitivity testing involves:

A) checking to see if your teeth hurt when you brush.
B) seeing how accurate data are.
C) checking to see if missing data will greatly impact results.
D) deleting the associated row.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
8
An integrity control supported by a DBMS is:

A) substitute estimates.
B) security.
C) range control.
D) GUI guards.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
9
A key decision in the physical design process is:

A) ignoring the size of the database.
B) selecting structures.
C) deciding on the monitor.
D) deciding the e-r diagrams.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
10
Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n):

A) extent.
B) table.
C) tablespace.
D) partition.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
11
The smallest unit of application data recognized by system software is a:

A) field.
B) row.
C) data type.
D) column.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
12
Designing physical files requires ________ of where and when data are used in various ways.

A) maps
B) descriptions
C) keys
D) hints
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
13
A contiguous section of disk storage space is called a(n):

A) track.
B) sector.
C) extent.
D) tablespace.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
14
All of the following are objectives when selecting a data type EXCEPT:

A) represent all possible values.
B) improve data integrity.
C) support all data manipulations.
D) use a lot of storage space.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
15
The value a field will assume unless the user enters an explicit value for an instance of that field is called a:

A) default value.
B) null value.
C) range control.
D) gurand.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
16
A detailed coding scheme recognized by system software for representing organizational data is called a(n):

A) DBMS code.
B) data type.
C) SQL.
D) DB layout.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is an objective of selecting a data type?

A) Represent a small number of possible values
B) Maximize storage space
C) Limit security
D) Improve data integrity
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
18
An appropriate datatype for one wanting a fixed-length type for last name would include:

A) VARCHAR.
B) CHAR.
C) BLOB.
D) DATE.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
19
All of the following are valid datatypes in Oracle 12c EXCEPT:

A) VARCHAR2.
B) BOOLEAN.
C) BLOB.
D) NUMBER.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
20
An appropriate datatype for adding a sound clip would be:

A) VARCHAR.
B) CHAR.
C) BLOB.
D) DATE.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
21
A method to allow adjacent secondary memory space to contain rows from several tables is called:

A) cluttering.
B) clustering.
C) concatenating.
D) compiling.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
22
A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers, and join tables to prepare query results is the:

A) explain plan.
B) show optimization.
C) explain query.
D) analyze query.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ________ is a field of data used to locate a related field or record.

A) key
B) index
C) lock
D) pointer
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
24
In most cases, the goal of ________ dominates the design process.

A) efficient data processing
B) security
C) quick pointer updates
D) shorter design times
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
25
Horizontal partitioning makes sense:

A) when different categories of a table's rows are processed separately.
B) when less security is needed.
C) when partitions must be organized the same.
D) when only one category is allowed.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
26
An index on columns from two or more tables that come from the same domain of values is called a:

A) bitmap index.
B) multivalued index.
C) join index.
D) transaction index.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
27
Which type of file is easiest to update?

A) Sequential
B) Hashed
C) Indexed
D) Clustered
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices.

A) physical pointer
B) retrieval program
C) file organization
D) update program
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
29
All of the following are common denormalization opportunities EXCEPT:

A) two entities with a one-to-one relationship.
B) a one-to-many relationship.
C) a many-to-many relationship with nonkey attributes.
D) reference data.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
30
An advantage of partitioning is:

A) efficiency.
B) remote optimization.
C) extra space and update time.
D) increase redundancy.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
31
A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called:

A) multiple partition queries.
B) perpendicular query processing.
C) parallel query processing.
D) query optimization.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
32
A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a:

A) hashed file organization.
B) hash key.
C) multi-indexed file organization.
D) hash index table.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
33
A(n) ________ is a routine that converts a primary key value into a record address.

A) record index calculator
B) index pointer program
C) hashing algorithm
D) pointing algorithm
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
34
A factor to consider when choosing a file organization is:

A) inefficient data retrieval.
B) DDL.
C) efficient storage.
D) DML.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
35
A disadvantage of partitioning is:

A) simplicity.
B) remote optimization.
C) extra space and update time.
D) shorter technology spans.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
36
Which type of file is most efficient with storage space?

A) Sequential
B) Hashed
C) Indexed
D) Clustered
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
37
Distributing the rows of data into separate files is called:

A) normalization.
B) horizontal partitioning.
C) vertical partitioning.
D) file allocation.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
38
In which type of file is multiple key retrieval not possible?

A) Sequential
B) Hashed
C) Indexed
D) Clustered
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
39
A file organization where files are not stored in any particular order is considered a:

A) hashed file organization.
B) hash key.
C) multi-indexed file organization.
D) heap file organization.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
40
One field or combination of fields for which more than one record may have the same combination of values is called a(n):

A) secondary key.
B) index.
C) composite key.
D) linked key.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
41
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:

A) checkpoint facility.
B) backup facility.
C) recovery manager.
D) database change log.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
42
A discrete unit of work that must be processed completely or not at all within a computer system is called a:

A) change control device.
B) transaction.
C) before image.
D) journalizing facility.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
43
Forward recovery is faster than restore/rerun because:

A) transactions do not have to be repeated.
B) security can be avoided.
C) images are mirrored.
D) systems are more complete.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
44
The preferred method of fixing an aborted transaction is:

A) repairing the schema.
B) switching.
C) duplication of data.
D) backing out the transaction.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
45
When incorrect data have been introduced, the database is best recovered by:

A) starting with a new ERD.
B) formatting server.
C) restarting from the most recent checkpoint and processing subsequent transactions.
D) reloading RDMS software.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
46
________ is used to undo unwanted database changes.

A) Rollback
B) Rollforward
C) Restart
D) Encryption
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is a principal type of authorization table?

A) Subject
B) Transaction
C) View
D) Index
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
48
While views promote security by restricting user access to data, they are not adequate security measures because:

A) an unauthorized person may gain access to a view through experimentation.
B) all users can read any view.
C) a view's data does not change.
D) views are not possible to create in most DBMS.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
49
The coding or scrambling of data so that humans cannot read them is called:

A) demarcation.
B) hiding.
C) encoding.
D) encryption.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
50
________ partitioning distributes the columns of a table into several separate physical records.

A) Horizontal
B) Crossways
C) Vertical
D) Final
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
51
An audit trail of database changes is kept by a:

A) change control device.
B) subschema.
C) before image.
D) journalizing facility.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
52
Sarbanes-Oxley Act was enacted to ensure the integrity of:

A) SQL.
B) public companies' financial statements.
C) private companies' shareholders meetings.
D) Entity-Relationship Diagrams.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
53
Guidelines for server security should include all of the following EXCEPT:

A) securing the network between client and server.
B) guidelines for password lengths.
C) password naming conventions.
D) guidelines for frequency of password changes.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following threats involves outside parties using information to embarrass a company?

A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
55
A form of denormalization where the same data are purposely stored in multiple places in the database is called:

A) data duplication.
B) data replication.
C) advanced placement.
D) horizontal partitioning.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
56
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process, and output electronic data in a secure manner is called a(n):

A) smart chip.
B) smart card.
C) e-credit card.
D) secure card.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
57
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.

A) backup facility
B) recovery manager
C) restart facility
D) transaction logger
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
58
Controls designed to restrict access and activities are called:

A) schemas.
B) business rules.
C) encryption controls.
D) authorization rules.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
59
A trigger can be used as a security measure in which of the following ways?

A) To check for viruses
B) To cause special handling procedures to be executed
C) To design a database
D) To conduct a DFD analysis
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
60
A device to measure or detect fingerprints or signatures is called a(n) ________ device.

A) biometric
B) view
C) ink
D) laser
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
61
The smallest unit of named application data is a record.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
62
A data management platform service is called:

A) Infrastructure-as-a-service.
B) Platform-as-a-service.
C) Software-as-a-service.
D) Database-as-a-service.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
63
A cloud computing approach in which the service consists mainly of hardware and systems software resources is called:

A) Infrastructure-as-a-service.
B) Platform-as-a-service.
C) Software-as-a-service.
D) IDE.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
64
All of the following are advantages to cloud-based computing EXCEPT:

A) no need for initial investment in hardware, physical facilities and systems software.
B) elasticity.
C) organizations can explore new data management technologies more easily.
D) ACID support for database as a service.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
65
Requirements for response time, data security, backup, and recovery are all requirements for physical design.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
66
The Number datatype would be appropriate for a zip code.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
67
With ________, the database itself is lost, destroyed, or cannot be read.

A) aborted transaction
B) database destruction
C) incorrect data
D) system failure
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
68
The logical database design always forms the best foundation for grouping attributes in the physical design.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
69
SOX stands for the Sorbet-Oxford Act.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
70
A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called:

A) Software-as-a-service.
B) Platform-as-a-service.
C) Infrastructure-as-a-service.
D) Tools-as-a-service.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
71
A default value is the value that a field will always assume, regardless of what the user enters for an instance of that field.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
72
All of the following are disadvantages to cloud-based computing EXCEPT:

A) the promise of elasticity is not fulfilled because the model will not adapt to changing requirements.
B) live migration from one environment to another is a challenge.
C) DBaaS is still struggling to provide ACID properties of databases.
D) the visibility of costs of data management is better.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
73
Efficient database structures will be beneficial only if queries and the underlying database management system are tuned to properly use the structures.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
74
A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called:

A) Infrastructure-as-a-service.
B) Platform-as-a-service.
C) Software-as-a-service.
D) Soft-computing-service.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
75
A transaction that terminates abnormally is called a(n) ________ transaction.

A) terminated
B) aborted
C) completed
D) deleted
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
76
One objective of selecting a data type is to minimize storage space.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
77
One decision in the physical design process is selecting structures.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
78
VarChar2 would be appropriate for a user that wanted a text datatype for LastName that would only consume the required space.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
79
All of the following are characteristics of cloud technologies EXCEPT:

A) unlimited bandwidth.
B) on-demand self-service IT capabilities.
C) broad network access.
D) rapid elasticity.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
80
Adding notations to the EER diagram regarding data volumes and usage is of no value to the physical design process.
Unlock Deck
Unlock for access to all 167 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 167 flashcards in this deck.