Deck 16: Database Administration and Security

Full screen (f)
exit full mode
Question
An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.
Use Space or
up arrow
down arrow
to flip the card.
Question
The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
Question
The DBA interacts with the end user by providing data and information support services to the organization's departments.
Question
The storage locations for multiple backups must include sites inside and outside the organization.
Question
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
Question
A full backup, or database dump, produces a complete copy of the entire database.
Question
Testing procedures and standards must already be in place before any application program can be approved for use in the company.
Question
The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department.
Question
System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
Question
The security, privacy, and integrity of data in a database are of minimal concern to DBAs who manage current DBMS installations.
Question
The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.
Question
Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database.
Question
In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity.
Question
A security vulnerability is a collection of standards and policies created to guarantee the security of a system and ensure auditing and compliance.
Question
Concurrent backups take place while the user is working on the database.
Question
A passive data dictionary is one that is updated automatically with every database access to keep its access information up to date.
Question
A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
Question
Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure.
Question
Incremental backups produce a backup of all data.
Question
The DBA must supervise the installation of all software and hardware designated to support the data administration strategy.
Question
The _____ administrator is responsible for strategic planning.

A) system
B) data
C) database
D) program
Question
At the level of middle management, the database must be able to provide _____.

A) frameworks for defining and enforcing organizational policies
B) data necessary for tactical decisions and planning
C) feedback to monitor whether a company is achieving its goals
D) access to external and internal data to identify growth opportunities
Question
_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

A) Integrity
B) Compliance
C) Availability
D) Confidentiality
Question
_____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.

A) Guidelines
B) Standards
C) Procedures
D) Documentations
Question
Which of the following is a reason why a DBMS's daily operations must be clearly documented?

A) Documentation of the daily operations help a company set its long-term goals.
B) Documentation of the daily operations help manage the manual data resources of a company.
C) Documentation of the daily operations help pinpoint causes and solutions of database problems.
D) Documentation of the daily operations help free the DBA from many lower-level technology-oriented tasks.
Question
User-access management is a subset of _____.

A) password protection
B) authorization management
C) data integrity management
D) managerial control
Question
In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions inan organization's:

A) lower levels.
B) top levels.
C) target markets.
D) customer base.
Question
Coordinating, monitoring, and allocating database administration resources is included in a DBA's _____ role.

A) operative
B) arbitration
C) technical
D) managerial
Question
Database administration operations are commonly defined and divided according to the phases of the _____.

A) SLA
B) DBLC
C) SDLC
D) MRA
Question
The person responsible for the control of the centralized and shared database is the database _____.

A) analyst
B) administrator
C) programmer
D) user
Question
_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.

A) Backup and recovery
B) System support
C) Performance monitoring and tuning
D) Security auditing and monitoring
Question
"A password must have a minimum of five characters" is an example of a _____.

A) policy
B) rule
C) procedure
D) standard
Question
In the context of data backup and recovery, the activities of a _____ includes the DBA operations that are classified as disaster management.

A) database programmer
B) systems analyst
C) data administrator
D) database security officer
Question
When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) _____ impact of the new database system.

A) cultural
B) managerial
C) technical
D) operational
Question
Instructions to create a password are an example of a _____.

A) rule
B) policy
C) standard
D) procedure
Question
A data administrator is also known as a(n) _____.

A) data security officer
B) systems administrator
C) information resource manager
D) information engineering officer
Question
A(n) _____ plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time.

A) access
B) completion
C) application
D) communications
Question
_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

A) Debilitative
B) Preserving
C) Corrupting
D) Destructive
Question
"All users must have passwords" is an example of a _____.

A) rule
B) policy
C) standard
D) procedure
Question
When performing user access management, a DBA defines each user to the database at the _____ levels.

A) application and DBMS
B) operating system and DBMS
C) operating system and application
D) application and network
Question
In the context of an organization's managerial structure, _____ decisions are short term and affect only daily operations; for example, deciding to change the price of a product to clear it from inventory.
Question
A(n) _____ data dictionary is automatically updated by the DBMS with every database access.

A) dynamic
B) active
C) passive
D) static
Question
In the context of the advancements in DBMS technology, the use of _____ data services can free the DBA from many lower-level technology-oriented tasks.
Question
In the context of data quality management tools, _____ software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.
Question
_____ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.

A) Access Management
B) Business Intelligence
C) Information engineering (IE)
D) MOLAP
Question
The _____ aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization.
Question
A(n) _____ data dictionary is not updated automatically and usually requires a batch process to be run.

A) active
B) passive
C) static
D) dynamic
Question
In the context of ensuring integrity of a database, a(n) _____ transaction is one that does not overload the DBMS.
Question
In the context of developing a data administration strategy, a(n) _____ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools.

A) access plan
B) active data dictionary
C) information systems architecture
D) security policy
Question
In the context of database administration, _____ is the extent to which individuals and organizations have the right to determine the "who, what, when, where, and how" of data usage.
Question
_____ CASE tools provide support for the coding and implementation phases.

A) Front-end
B) Back-end
C) Vertical
D) Horizontal
Question
The DSO's activities are often classified as _____ management, which includes all DBA activities designed to ensure data availability following a physical calamity or a database integrity failure.
Question
A(n) _____ is a logical storage area in Oracle.

A) audit log
B) datafile
C) schema
D) tablespace
Question
Based on the type of decision-making support required, database users may be classified into: operational, tactical, or _____.
Question
The _____, also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap.
Question
In the context of database usage monitoring, a(n) _____ is a file that automatically records a brief description of the database operations performed by all users.

A) change tracker
B) digital footprint
C) paper trail
D) audit log
Question
The _____ component of a CASE tool produces the information system's input/output formats.

A) analysis
B) graphics
C) program document generator
D) screen painter and report generator
Question
_____ CASE tools provide support for the planning, analysis, and design phases.

A) Front-end
B) Back-end
C) Vertical
D) Horizontal
Question
In case a company installs several incompatible databases and assigns a DBA for each of them, the general coordinator of all such DBAs is known as the _____ administrator.
Question
One of the important functions provided by the database _____ is to reserve the resources that must be used by the database at run time.

A) security component
B) authorization manager
C) initialization parameters
D) administrator
Question
In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of settings that control how much of the database resource
a given user can access.
Question
Describe the DBA's managerial role.
Question
In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of database access privileges that authorize a user to connect to the database and use its system resources.
Question
A(n) _____ physically stores the database's data.
Question
Describe the need for convenient and safe backup storage.
Question
Each database has an associated_____ file that is read at instance startup, stores run-time configuration parameters, and is used to set the working environment for the database.
Question
A security _____ is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
Question
Explain user requirements gathering as part of the DBA's end-user support services.
Question
Explain conflict and problem resolution as part of the DBA's end-user support services.
Question
Performance monitoring and _____ activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels.
Question
Within the data security framework, _____ is concerned with keeping data consistent and free of errors or anomalies.
Question
In the context of Oracle Enterprise Manager, a(n) _____ isa uniquely identifiable object that allows a given person to log on to the
database.
Question
In the context of Oracle Enterprise Manager, "CONNECT" allows a user to connect to the database and then create and modify tables, views, and other data-related objects. This is an example of a(n) _____.
Question
The DBA must review the database application design to ensure that transactions are _____, meaning that they mirror real-world events.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/74
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Database Administration and Security
1
An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.
True
2
The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
True
3
The DBA interacts with the end user by providing data and information support services to the organization's departments.
True
4
The storage locations for multiple backups must include sites inside and outside the organization.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
5
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
6
A full backup, or database dump, produces a complete copy of the entire database.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
7
Testing procedures and standards must already be in place before any application program can be approved for use in the company.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
8
The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
9
System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
10
The security, privacy, and integrity of data in a database are of minimal concern to DBAs who manage current DBMS installations.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
11
The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
12
Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
13
In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
14
A security vulnerability is a collection of standards and policies created to guarantee the security of a system and ensure auditing and compliance.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
15
Concurrent backups take place while the user is working on the database.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
16
A passive data dictionary is one that is updated automatically with every database access to keep its access information up to date.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
17
A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
18
Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
19
Incremental backups produce a backup of all data.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
20
The DBA must supervise the installation of all software and hardware designated to support the data administration strategy.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
21
The _____ administrator is responsible for strategic planning.

A) system
B) data
C) database
D) program
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
22
At the level of middle management, the database must be able to provide _____.

A) frameworks for defining and enforcing organizational policies
B) data necessary for tactical decisions and planning
C) feedback to monitor whether a company is achieving its goals
D) access to external and internal data to identify growth opportunities
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
23
_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

A) Integrity
B) Compliance
C) Availability
D) Confidentiality
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
24
_____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.

A) Guidelines
B) Standards
C) Procedures
D) Documentations
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is a reason why a DBMS's daily operations must be clearly documented?

A) Documentation of the daily operations help a company set its long-term goals.
B) Documentation of the daily operations help manage the manual data resources of a company.
C) Documentation of the daily operations help pinpoint causes and solutions of database problems.
D) Documentation of the daily operations help free the DBA from many lower-level technology-oriented tasks.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
26
User-access management is a subset of _____.

A) password protection
B) authorization management
C) data integrity management
D) managerial control
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
27
In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions inan organization's:

A) lower levels.
B) top levels.
C) target markets.
D) customer base.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
28
Coordinating, monitoring, and allocating database administration resources is included in a DBA's _____ role.

A) operative
B) arbitration
C) technical
D) managerial
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
29
Database administration operations are commonly defined and divided according to the phases of the _____.

A) SLA
B) DBLC
C) SDLC
D) MRA
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
30
The person responsible for the control of the centralized and shared database is the database _____.

A) analyst
B) administrator
C) programmer
D) user
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
31
_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.

A) Backup and recovery
B) System support
C) Performance monitoring and tuning
D) Security auditing and monitoring
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
32
"A password must have a minimum of five characters" is an example of a _____.

A) policy
B) rule
C) procedure
D) standard
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
33
In the context of data backup and recovery, the activities of a _____ includes the DBA operations that are classified as disaster management.

A) database programmer
B) systems analyst
C) data administrator
D) database security officer
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
34
When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) _____ impact of the new database system.

A) cultural
B) managerial
C) technical
D) operational
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
35
Instructions to create a password are an example of a _____.

A) rule
B) policy
C) standard
D) procedure
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
36
A data administrator is also known as a(n) _____.

A) data security officer
B) systems administrator
C) information resource manager
D) information engineering officer
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) _____ plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time.

A) access
B) completion
C) application
D) communications
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
38
_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

A) Debilitative
B) Preserving
C) Corrupting
D) Destructive
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
39
"All users must have passwords" is an example of a _____.

A) rule
B) policy
C) standard
D) procedure
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
40
When performing user access management, a DBA defines each user to the database at the _____ levels.

A) application and DBMS
B) operating system and DBMS
C) operating system and application
D) application and network
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
41
In the context of an organization's managerial structure, _____ decisions are short term and affect only daily operations; for example, deciding to change the price of a product to clear it from inventory.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
42
A(n) _____ data dictionary is automatically updated by the DBMS with every database access.

A) dynamic
B) active
C) passive
D) static
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
43
In the context of the advancements in DBMS technology, the use of _____ data services can free the DBA from many lower-level technology-oriented tasks.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
44
In the context of data quality management tools, _____ software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
45
_____ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.

A) Access Management
B) Business Intelligence
C) Information engineering (IE)
D) MOLAP
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
46
The _____ aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
47
A(n) _____ data dictionary is not updated automatically and usually requires a batch process to be run.

A) active
B) passive
C) static
D) dynamic
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
48
In the context of ensuring integrity of a database, a(n) _____ transaction is one that does not overload the DBMS.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
49
In the context of developing a data administration strategy, a(n) _____ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools.

A) access plan
B) active data dictionary
C) information systems architecture
D) security policy
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
50
In the context of database administration, _____ is the extent to which individuals and organizations have the right to determine the "who, what, when, where, and how" of data usage.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
51
_____ CASE tools provide support for the coding and implementation phases.

A) Front-end
B) Back-end
C) Vertical
D) Horizontal
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
52
The DSO's activities are often classified as _____ management, which includes all DBA activities designed to ensure data availability following a physical calamity or a database integrity failure.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
53
A(n) _____ is a logical storage area in Oracle.

A) audit log
B) datafile
C) schema
D) tablespace
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
54
Based on the type of decision-making support required, database users may be classified into: operational, tactical, or _____.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
55
The _____, also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
56
In the context of database usage monitoring, a(n) _____ is a file that automatically records a brief description of the database operations performed by all users.

A) change tracker
B) digital footprint
C) paper trail
D) audit log
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
57
The _____ component of a CASE tool produces the information system's input/output formats.

A) analysis
B) graphics
C) program document generator
D) screen painter and report generator
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
58
_____ CASE tools provide support for the planning, analysis, and design phases.

A) Front-end
B) Back-end
C) Vertical
D) Horizontal
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
59
In case a company installs several incompatible databases and assigns a DBA for each of them, the general coordinator of all such DBAs is known as the _____ administrator.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
60
One of the important functions provided by the database _____ is to reserve the resources that must be used by the database at run time.

A) security component
B) authorization manager
C) initialization parameters
D) administrator
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
61
In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of settings that control how much of the database resource
a given user can access.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
62
Describe the DBA's managerial role.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
63
In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of database access privileges that authorize a user to connect to the database and use its system resources.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
64
A(n) _____ physically stores the database's data.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
65
Describe the need for convenient and safe backup storage.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
66
Each database has an associated_____ file that is read at instance startup, stores run-time configuration parameters, and is used to set the working environment for the database.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
67
A security _____ is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
68
Explain user requirements gathering as part of the DBA's end-user support services.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
69
Explain conflict and problem resolution as part of the DBA's end-user support services.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
70
Performance monitoring and _____ activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
71
Within the data security framework, _____ is concerned with keeping data consistent and free of errors or anomalies.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
72
In the context of Oracle Enterprise Manager, a(n) _____ isa uniquely identifiable object that allows a given person to log on to the
database.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
73
In the context of Oracle Enterprise Manager, "CONNECT" allows a user to connect to the database and then create and modify tables, views, and other data-related objects. This is an example of a(n) _____.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
74
The DBA must review the database application design to ensure that transactions are _____, meaning that they mirror real-world events.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 74 flashcards in this deck.