Deck 8: Database Administration
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 8: Database Administration
1
A shared lock permits other users to read the data in the database.
True
2
To protect an organization's data against physical damage,the DBA creates a disaster recovery plan.
True
3
Management approval is not required before the security policies and procedures can be implemented.
False
4
A ____ is a place where a record of certain corporate data is kept.
A) depository
B) data archive
C) storage
D) data bank
A) depository
B) data archive
C) storage
D) data bank
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Damage to a database can occur through a physical incident such as an abnormally terminated program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may be locked and are exclusive locks the only ones permitted?
A) Concurrent update
B) Data recovery
C) Data dictionary
D) Security
A) Concurrent update
B) Data recovery
C) Data dictionary
D) Security
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following DBMS evaluation categories does the following question relate to: Is it a simple catalog or can it contain more content,such as information about programs and the various data items these programs access?
A) Backup and recovery
B) Data dictionary
C) Security
D) Integrity
A) Backup and recovery
B) Data dictionary
C) Security
D) Integrity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The DBA is responsible for DBMS maintenance,data dictionary management,and training.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The CEO of the company determines the database access privileges for all users.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
QBE is an example of a procedural language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The DBA creates security policies and procedures.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
When a company decides to purchase a new DBMS,the CEO leads the DBMS evaluation and selection effort.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
To implement and enforce security,the DBA uses such features as encryption and views.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
An internal company network that uses software tools typically used on the Internet and World Wide Web is called an extranet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Another term for production system is the test system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
____ locks forbid any other user from accessing the data in any way.
A) Shared
B) Exclusive
C) Limited
D) Concurrent
A) Shared
B) Exclusive
C) Limited
D) Concurrent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
SQL is an example of a nonprocedural language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
In most cases,access to every table and field in a database is a necessity for every user.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Programmers monitor database usage to detect potential security violations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The ____ determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog to ensure that users access the database only in ways in which they are entitled to do so.
A) CEO
B) programmer
C) DBA
D) IT manager
A) CEO
B) programmer
C) DBA
D) IT manager
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
____ converts a table that is in third normal form to a table no longer in third normal form.
A) Conversion
B) Denormalization
C) Normalization
D) Replication
A) Conversion
B) Denormalization
C) Normalization
D) Replication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas?
A) Backup and recovery
B) Security
C) Integrity
D) Replication and distributed databases
A) Backup and recovery
B) Security
C) Integrity
D) Replication and distributed databases
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
The ____________________ recovery plan specifies the ongoing and emergency actions and procedures required to ensure data availability if a disaster occurs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following DBMS evaluation categories does the following question relate to: Does the vendor of the DBMS supply printed or online training manuals and how good are the manuals?
A) Portability
B) Performance
C) Cost
D) Documentation and training
A) Portability
B) Performance
C) Cost
D) Documentation and training
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The ____ is responsible for providing training in the use of the DBMS.
A) programmer
B) analyst
C) DBA
D) CEO
A) programmer
B) analyst
C) DBA
D) CEO
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
____________________ is the prevention of unauthorized access,either intentional or accidental,to a database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
After the database designers complete the information-level design,the DBA does the ____-level design.
A) physical
B) information
C) logical
D) graphical
A) physical
B) information
C) logical
D) graphical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
If a DBMS lacks essential security features,the _________________________ might create or purchase special security programs that provide the missing features.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
By default,Access and other DBMSs create indexes automatically for the ____ keys.
A) primary and minor
B) alternate and foreign
C) secondary and alternate
D) primary and foreign
A) primary and minor
B) alternate and foreign
C) secondary and alternate
D) primary and foreign
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export?
A) Cost
B) Future plans
C) Portability
D) Performance
A) Cost
B) Future plans
C) Portability
D) Performance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
After the DBMS is purchased,the ____ has primary responsibility for installation and maintenance.
A) IT manager
B) DBA
C) CEO
D) user
A) IT manager
B) DBA
C) CEO
D) user
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Changing the database design to improve the performance is called ____.
A) tending the design
B) focusing the design
C) tuning the design
D) modifying the design
A) tending the design
B) focusing the design
C) tuning the design
D) modifying the design
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Copies of archival files and database backups should be stored ____________________-site.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following DBMS evaluation categories does the following question relate to: On what operating system and hardware is the DBMS supported?
A) Concurrent update
B) Security
C) Limitations
D) Limitations
A) Concurrent update
B) Security
C) Limitations
D) Limitations
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
____ integrity is the constraint that says that the values in foreign keys must match values already in the database.
A) Parallel
B) Relational
C) Conditional
D) Referential
A) Parallel
B) Relational
C) Conditional
D) Referential
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
In order to develop new programs,the programmers need access to the information in the DBMS.They are given access to the ____.
A) production system
B) test system
C) live system
D) documentation system
A) production system
B) test system
C) live system
D) documentation system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The ____ establishes the naming conventions for tables,fields,and indexes in the data dictionary.
A) users
B) DBMS
C) DBA
D) programmers
A) users
B) DBMS
C) DBA
D) programmers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Tables with indexes allow faster searches,but slow performance on ____.
A) insertions
B) deletions
C) updates
D) selects
A) insertions
B) deletions
C) updates
D) selects
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time?
A) Concurrent update
B) Security
C) Integrity
D) Limitations
A) Concurrent update
B) Security
C) Integrity
D) Limitations
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
A(n)____________________ site is a backup site that is equipped with duplicate hardware and software but not data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is the DBA's role with regard to access privileges?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What can the DBA do if the organization has no additional money for its production system but needs further performance improvements?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
The hardware,software,and database for the users is called the ____________________ system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is a hot site?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
When the primary key cannot be null,this is known as ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
The _________________________ strictly controls the production system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
____________________ help means that if a user is having trouble and asks for help,the DBMS will provide assistance for the particular feature being used at the time the user asks for help.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
With just two exceptions,the DBA grants access and update privileges to the production system only to authorized users.What are the exceptions?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
A configuration of several computers connected together that allow users to share a variety of hardware and software resources is known as a(n)_________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Discuss the steps that organizations take to protect their data against hard drive failures and electrical power interruptions or outages.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck