Deck 12: Data and Database Administration
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/110
Play
Full screen (f)
Deck 12: Data and Database Administration
1
The ________ occurs when one user reads data that have been partially updated by another user.
A) inconsistent read problem
B) distant read problem
C) honest dirty data
D) data quality problem
A) inconsistent read problem
B) distant read problem
C) honest dirty data
D) data quality problem
A
2
A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked.
A) record controller
B) exclusive lock
C) authorization rule
D) shared lock
A) record controller
B) exclusive lock
C) authorization rule
D) shared lock
B
3
Which of the following is NOT a component of a repository system architecture?
A) An informational model
B) The repository engine
C) A data transformation process
D) The repository database
A) An informational model
B) The repository engine
C) A data transformation process
D) The repository database
C
4
An optimistic approach to concurrency control is called:
A) versioning.
B) denormalization.
C) deadlock resolution.
D) HappyControl.
A) versioning.
B) denormalization.
C) deadlock resolution.
D) HappyControl.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
5
An organization should have one data warehouse administrator for every:
A) 100 users.
B) 100 gigabytes of data in the enterprise data warehouse.
C) department.
D) processor.
A) 100 users.
B) 100 gigabytes of data in the enterprise data warehouse.
C) department.
D) processor.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
6
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.
A) logging
B) concurrency control
C) transaction authorization
D) multiple management
A) logging
B) concurrency control
C) transaction authorization
D) multiple management
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following threats involves outside parties using information to embarrass a company?
A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is NOT true of poor data and/or database administration?
A) Data timing problems
B) Multiple entity definitions
C) Unknown meanings of stored data
D) Maintaining a secure server
A) Data timing problems
B) Multiple entity definitions
C) Unknown meanings of stored data
D) Maintaining a secure server
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
9
________ is a technical function responsible for database design, security, and disaster recovery.
A) Data administration
B) Database administration
C) Tech support
D) Operations
A) Data administration
B) Database administration
C) Tech support
D) Operations
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
10
Guidelines for server security should include all of the following EXCEPT:
A) securing the network between client and server.
B) guidelines for password lengths.
C) password naming conventions.
D) guidelines for frequency of password changes.
A) securing the network between client and server.
B) guidelines for password lengths.
C) password naming conventions.
D) guidelines for frequency of password changes.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
11
A(n) ________ stores metadata about an organization's data and data processing resources.
A) DBA
B) information repository
C) organizational system catalog
D) data dictionary
A) DBA
B) information repository
C) organizational system catalog
D) data dictionary
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
12
The role of a ________ emphasizes integration and coordination of metadata across many data sources.
A) data warehouse administrator
B) database administrator
C) data administrator
D) data architect
A) data warehouse administrator
B) database administrator
C) data administrator
D) data architect
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following functions do cost/benefit models?
A) Database planning
B) Database analysis
C) Database design
D) Operations
A) Database planning
B) Database analysis
C) Database design
D) Operations
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
14
An information repository supplies information:
A) to database programmers only.
B) to only internal sources.
C) to database management systems.
D) exclusively to data lakes.
A) to database programmers only.
B) to only internal sources.
C) to database management systems.
D) exclusively to data lakes.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following functions model business rules?
A) Database planning
B) Database analysis
C) Database design
D) Operations
A) Database planning
B) Database analysis
C) Database design
D) Operations
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
16
An open-source DBMS is:
A) a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
B) a beta release of a commercial RDBMS.
C) an object-oriented database management system.
D) source code for a commercial RDBMS.
A) a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
B) a beta release of a commercial RDBMS.
C) an object-oriented database management system.
D) source code for a commercial RDBMS.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
17
The extent of the database resource that is included with each lock is called the level of:
A) impact.
B) management.
C) lock granularity.
D) TIO.
A) impact.
B) management.
C) lock granularity.
D) TIO.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.
A) record controller
B) exclusive lock
C) authorization rule
D) two-phase lock
A) record controller
B) exclusive lock
C) authorization rule
D) two-phase lock
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
19
A repository of information about a database that documents data elements of a database is called a:
A) schema.
B) subschema.
C) view.
D) data dictionary.
A) schema.
B) subschema.
C) view.
D) data dictionary.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following functions develop integrity controls?
A) Database planning
B) Database analysis
C) Database implementation
D) Database design
A) Database planning
B) Database analysis
C) Database implementation
D) Database design
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
21
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process and output electronic data in a secure manner is called a(n):
A) smart chip.
B) smart card.
C) e-credit card.
D) secure card.
A) smart chip.
B) smart card.
C) e-credit card.
D) secure card.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
22
While views promote security by restricting user access to data, they are not adequate security measures because:
A) an unauthorized person may gain access to a view through experimentation.
B) all users can read any view.
C) a view's data does not change.
D) views are not possible to create in most DBMS.
A) an unauthorized person may gain access to a view through experimentation.
B) all users can read any view.
C) a view's data does not change.
D) views are not possible to create in most DBMS.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
23
An audit trail of database changes is kept by a:
A) change control device.
B) subschema.
C) before image.
D) journalizing facility.
A) change control device.
B) subschema.
C) before image.
D) journalizing facility.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
24
The W3C standard for Web privacy is called:
A) the Web privacy act.
B) Platform for Privacy Preferences.
C) Freedom of Web Information Act.
D) the Magna Carta.
A) the Web privacy act.
B) Platform for Privacy Preferences.
C) Freedom of Web Information Act.
D) the Magna Carta.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
25
The preferred method of fixing an aborted transaction is:
A) repairing the schema.
B) switching.
C) duplication of data.
D) backing out the transaction.
A) repairing the schema.
B) switching.
C) duplication of data.
D) backing out the transaction.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is a principal type of authorization table?
A) Subject
B) Transaction
C) View
D) Index
A) Subject
B) Transaction
C) View
D) Index
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
27
When incorrect data have been introduced, the database is best recovered by:
A) starting with a new ERD.
B) formatting server.
C) restarting from the most recent checkpoint and processing subsequent transactions.
D) reloading RDMS software.
A) starting with a new ERD.
B) formatting server.
C) restarting from the most recent checkpoint and processing subsequent transactions.
D) reloading RDMS software.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
28
A discrete unit of work that must be processed completely or not at all within a computer system is called a:
A) change control device.
B) transaction.
C) before image.
D) journalizing facility.
A) change control device.
B) transaction.
C) before image.
D) journalizing facility.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
29
Forward recovery is faster than restore/rerun because:
A) transactions do not have to be repeated.
B) security can be avoided.
C) images are mirrored.
D) systems are more complete.
A) transactions do not have to be repeated.
B) security can be avoided.
C) images are mirrored.
D) systems are more complete.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
30
The coding or scrambling of data so that humans cannot read them is called:
A) demarcation.
B) hiding.
C) encoding.
D) encryption.
A) demarcation.
B) hiding.
C) encoding.
D) encryption.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is a type of network security?
A) Authentication of the client workstation
B) Password naming conventions
C) Guidelines for frequency of password changes
D) Random password guessing
A) Authentication of the client workstation
B) Password naming conventions
C) Guidelines for frequency of password changes
D) Random password guessing
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
32
________ is used to undo unwanted database changes.
A) Rollback
B) Rollforward
C) Restart
D) Encryption
A) Rollback
B) Rollforward
C) Restart
D) Encryption
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
33
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.
A) backup facility
B) recovery manager
C) restart facility
D) transaction logger
A) backup facility
B) recovery manager
C) restart facility
D) transaction logger
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
34
Controls designed to restrict access and activities are called:
A) schemas.
B) business rules.
C) encryption controls.
D) authorization rules.
A) schemas.
B) business rules.
C) encryption controls.
D) authorization rules.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
35
Sarbanes-Oxley Act was enacted to ensure the integrity of:
A) SQL.
B) public companies' financial statements.
C) private companies shareholders meetings.
D) Entity-Relationship Diagrams.
A) SQL.
B) public companies' financial statements.
C) private companies shareholders meetings.
D) Entity-Relationship Diagrams.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
36
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:
A) checkpoint facility.
B) backup facility.
C) recovery manager.
D) database change log.
A) checkpoint facility.
B) backup facility.
C) recovery manager.
D) database change log.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
37
A device to measure or detect fingerprints or signatures is called a(n) ________ device.
A) biometric
B) view
C) ink
D) laser
A) biometric
B) view
C) ink
D) laser
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
38
Security measures for dynamic Web pages are different from static HTML pages because:
A) dynamic Web pages are built "on the fly."
B) static Web pages contain more sensitive data.
C) the connection requires full access to the database for dynamic pages.
D) HTML is more complex than dynamic Web pages.
A) dynamic Web pages are built "on the fly."
B) static Web pages contain more sensitive data.
C) the connection requires full access to the database for dynamic pages.
D) HTML is more complex than dynamic Web pages.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
39
A trigger can be used as a security measure in which of the following ways?
A) To check for viruses
B) To cause special handling procedures to be executed
C) To design a database
D) To conduct a DFD analysis
A) To check for viruses
B) To cause special handling procedures to be executed
C) To design a database
D) To conduct a DFD analysis
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
40
A transaction that terminates abnormally is called a(n) ________ transaction.
A) terminated
B) aborted
C) completed
D) deleted
A) terminated
B) aborted
C) completed
D) deleted
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is NOT an area of concern when trying to maintain a well-tuned database?
A) Memory usage
B) CPU usage
C) Input/output contention
D) User interface design
A) Memory usage
B) CPU usage
C) Input/output contention
D) User interface design
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
42
A repository of information about data is called a catalog.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
43
The Information Resource Lexicon System (IRLS) is a computer software tool used to manage and control access to the information repository.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
44
A(n) ________ is submitted by a DBA to test the current performance of a database or predict the response time for queries.
A) elusive query
B) performance test
C) heartbeat query
D) HTML
A) elusive query
B) performance test
C) heartbeat query
D) HTML
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
45
The data administrator takes responsibility for the overall management of data resources.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
46
Specifications for transactions do not need to be reviewed quickly.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
47
Research shows that if an online customer does not get the service he or she expects within a few ________, the customer will switch to a competitor.
A) seconds
B) minutes
C) hours
D) days
A) seconds
B) minutes
C) hours
D) days
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
48
A high-level function that is responsible for the overall management of data resources in an organization is called database administration.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
49
With ________, the database itself is lost, destroyed, or cannot be read.
A) aborted transaction
B) database destruction
C) incorrect data
D) system failure
A) aborted transaction
B) database destruction
C) incorrect data
D) system failure
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
50
The repository information model defines types, which should be easy to extend.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
51
Open-source DBMS are free software that provide the core functionality of an SQL compliant DBMS.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
52
CASE tool-generated information should be fed into repositories.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
53
Concurrent transactions need to be processed in isolation so that they do not interfere with each other.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
54
The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
55
Most data outages in organizations are caused by:
A) hardware failures.
B) software failures.
C) human error.
D) electrical outages.
A) hardware failures.
B) software failures.
C) human error.
D) electrical outages.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
56
The role of database administration is typically a more hands-on, physical involvement with the management of databases.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
57
The granularity of locking is not a critical decision in database design.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
58
Specifying database access policies is done during the database implementation phase.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
59
Databases are generally the property of a single department within an organization.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
60
Open-source software always comes with complete documentation.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
61
Any data that are retrieved by a user for updating must be locked until the update is completed or aborted.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
62
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
63
Three-factor authentication is most often implemented with a credit card.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
64
An audit trail of transactions and database changes is kept by a journalizing facility.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
65
Exclusive locks allow other transactions to read but not update a record or other resource.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
66
Field-level locks are used quite often.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
67
The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
68
Versioning takes the pessimistic approach to locking.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
69
A shared lock allows other transactions to read but not update records in use.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
70
A view can be built to present only the data to which a user requires access.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
71
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
72
The process of managing simultaneous operations against a database so that data integrity is maintained is called completeness control.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
73
Loss of data integrity does not impact the quality of data in a database.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
74
Controls incorporated into a data management system that restrict access to data are called authentication rules.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
75
A domain is a way to create a structure that acts like a table.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
76
Two-phase locking results in a growing phase where locks are acquired and a shrinking phase where locks are released.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
77
With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
78
A deadlock results when two transactions try to read the same record.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
79
There are two principal types of authorization tables: one for subjects and one for facts.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
80
A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck