Deck 8: Database Administration

Full screen (f)
exit full mode
Question
To protect an organization's data against physical damage,the DBA creates and implements backup and recovery procedures as part of a disaster recovery plan.
Use Space or
up arrow
down arrow
to flip the card.
Question
When a company decides to purchase a new DBMS,the CEO leads the DBMS evaluation and selection effort.
Question
Management approval is not required before the security policies and procedures can be implemented.
Question
The DBA is responsible for DBMS maintenance,data dictionary management,and training.
Question
If a DBMS lacks essential security features,the DBA might create or purchase special security programs that provide the missing features.
Question
Programmers monitor database usage to detect potential security violations.
Question
Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may be locked and are exclusive locks the only ones permitted?

A)Concurrent update
B)Data recovery
C)Data dictionary
D)Security
Question
Another term for production system is the sandbox.
Question
The ____ determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog to ensure that users access the database only in ways in which they are entitled to do so.

A)CEO
B)programmer
C)DBA
D)IT manager
Question
An internal company network that uses software tools typically used on the Internet and World Wide Web is called a virtual network.
Question
SQL is an example of a procedural language.
Question
Damage to a database can occur through a physical incident such as a computer malfunction.
Question
To implement and enforce security,the DBA uses such features as journaling and metadata.
Question
QBE is an example of a nonprocedural language.
Question
____ locks forbid any other user from accessing the data in any way.

A)Shared
B)Exclusive
C)Limited
D)Concurrent
Question
Any changes made in the database structure are communicated only to the affected users.
Question
A shared lock permits other users to read the data in the database.
Question
A ____ is a place where a record of certain corporate data is kept.

A)depository
B)data archive
C)storage
D)data bank
Question
Which of the following DBMS evaluation categories does the following question relate to: Is it a simple catalog or can it contain more content,such as information about programs and the various data items these programs access?

A)Backup and recovery
B)Data dictionary
C)Security
D)Integrity
Question
The DBA determines and documents the database access privileges for all users.
Question
After the DBMS is purchased,the ____ has primary responsibility for installation and maintenance.

A)IT manager
B)DBA
C)CEO
D)user
Question
By default,Access and other DBMSs create indexes automatically for the ____ keys.

A)primary and minor
B)alternate and foreign
C)secondary and alternate
D)primary and foreign
Question
Changing the database design to improve the performance is called ____ the design.

A)tending
B)focusing
C)tuning
D)modifying
Question
____________________ is the prevention of unauthorized access,either intentional or accidental,to a database.
Question
____ integrity is the constraint that says that the values in foreign keys must match values already in the database.

A)Parallel
B)Relational
C)Conditional
D)Referential
Question
Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time?

A)Concurrent update
B)Security
C)Integrity
D)Limitations
Question
____________________ is the rule that the primary key cannot be null.
Question
After the database designers complete the information-level design,the DBA does the ____-level design.

A)physical
B)information
C)logical
D)graphical
Question
The ____________________ Act of 2002 is a federal law that specifies data retention and verification requirements for public companies,requires CEOs and CFOs to certify financial statements,and makes it a crime to tamper with financial records.
Question
In order to develop new programs,the programmers need access to the information in the DBMS. They are given access to the ____.

A)production system
B)test system
C)live system
D)documentation system
Question
____ converts a table that is in third normal form to a table no longer in third normal form.

A)Conversion
B)Denormalization
C)Normalization
D)Replication
Question
To protect against electrical power interruptions and outages,organizations use a(n) ____________________,which is a power source such as battery or fuel cell.
Question
The ____ is responsible for providing training in the use of the DBMS.

A)programmer
B)analyst
C)DBA
D)CEO
Question
Tables with indexes allow faster searches,but slower performance on ____.

A)queries
B)reports
C)updates
D)selects
Question
The ____ establishes the naming conventions for tables,fields,and indexes in the data dictionary.

A)user
B)DBMS
C)DBA
D)programmer
Question
Which of the following DBMS evaluation categories does the following question relate to: Does the vendor of the DBMS supply printed or online training manuals and how good are the manuals?

A)Portability
B)Performance
C)Cost
D)Documentation and training
Question
Which of the following DBMS evaluation categories does the following question relate to: On what operating system and hardware is the DBMS supported?

A)Concurrent update
B)Security
C)Integrity
D)Limitations
Question
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas?

A)Backup and recovery
B)Security
C)Integrity
D)Replication and distributed databases
Question
Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export?

A)Cost
B)Future plans
C)Portability
D)Performance
Question
The DBA uses views and the SQL ____________________ statement as two security mechanisms.
Question
With just two exceptions,the DBA grants access and update privileges to the production system only to authorized users. What are the exceptions?
Question
A configuration of several computers connected together that allow users to share a variety of hardware and software resources is known as a(n) ____________________.
Question
If users access only certain fields in a table,you can improve performance by ____________________ the tables into two or more tables that each have the same primary key as the original and that collectively contain all the fields from the original table.
Question
The ____________________ strictly controls the production system.
Question
____________________ help means that if a user is having trouble and asks for help,the DBMS will provide assistance for the particular feature being used at the time the user asks for help.
Question
What is the DBA's role with regard to access privileges?
Question
What can the DBA do if the organization has no additional money for its production system but needs further performance improvements?
Question
What is a hot site? What is a warm site? What is the difference between the two?
Question
The hardware,software,and database for the users is called the ____________________ system.
Question
Discuss the steps that organizations take to protect their data against hard drive failures and electrical power interruptions or outages.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Database Administration
1
To protect an organization's data against physical damage,the DBA creates and implements backup and recovery procedures as part of a disaster recovery plan.
True
2
When a company decides to purchase a new DBMS,the CEO leads the DBMS evaluation and selection effort.
False
3
Management approval is not required before the security policies and procedures can be implemented.
False
4
The DBA is responsible for DBMS maintenance,data dictionary management,and training.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
If a DBMS lacks essential security features,the DBA might create or purchase special security programs that provide the missing features.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Programmers monitor database usage to detect potential security violations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may be locked and are exclusive locks the only ones permitted?

A)Concurrent update
B)Data recovery
C)Data dictionary
D)Security
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Another term for production system is the sandbox.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog to ensure that users access the database only in ways in which they are entitled to do so.

A)CEO
B)programmer
C)DBA
D)IT manager
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
An internal company network that uses software tools typically used on the Internet and World Wide Web is called a virtual network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
SQL is an example of a procedural language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Damage to a database can occur through a physical incident such as a computer malfunction.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
To implement and enforce security,the DBA uses such features as journaling and metadata.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
QBE is an example of a nonprocedural language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
____ locks forbid any other user from accessing the data in any way.

A)Shared
B)Exclusive
C)Limited
D)Concurrent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Any changes made in the database structure are communicated only to the affected users.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
A shared lock permits other users to read the data in the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
A ____ is a place where a record of certain corporate data is kept.

A)depository
B)data archive
C)storage
D)data bank
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following DBMS evaluation categories does the following question relate to: Is it a simple catalog or can it contain more content,such as information about programs and the various data items these programs access?

A)Backup and recovery
B)Data dictionary
C)Security
D)Integrity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The DBA determines and documents the database access privileges for all users.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
After the DBMS is purchased,the ____ has primary responsibility for installation and maintenance.

A)IT manager
B)DBA
C)CEO
D)user
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
By default,Access and other DBMSs create indexes automatically for the ____ keys.

A)primary and minor
B)alternate and foreign
C)secondary and alternate
D)primary and foreign
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Changing the database design to improve the performance is called ____ the design.

A)tending
B)focusing
C)tuning
D)modifying
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
____________________ is the prevention of unauthorized access,either intentional or accidental,to a database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
____ integrity is the constraint that says that the values in foreign keys must match values already in the database.

A)Parallel
B)Relational
C)Conditional
D)Referential
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time?

A)Concurrent update
B)Security
C)Integrity
D)Limitations
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
____________________ is the rule that the primary key cannot be null.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
After the database designers complete the information-level design,the DBA does the ____-level design.

A)physical
B)information
C)logical
D)graphical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The ____________________ Act of 2002 is a federal law that specifies data retention and verification requirements for public companies,requires CEOs and CFOs to certify financial statements,and makes it a crime to tamper with financial records.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
In order to develop new programs,the programmers need access to the information in the DBMS. They are given access to the ____.

A)production system
B)test system
C)live system
D)documentation system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____ converts a table that is in third normal form to a table no longer in third normal form.

A)Conversion
B)Denormalization
C)Normalization
D)Replication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
To protect against electrical power interruptions and outages,organizations use a(n) ____________________,which is a power source such as battery or fuel cell.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
The ____ is responsible for providing training in the use of the DBMS.

A)programmer
B)analyst
C)DBA
D)CEO
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Tables with indexes allow faster searches,but slower performance on ____.

A)queries
B)reports
C)updates
D)selects
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The ____ establishes the naming conventions for tables,fields,and indexes in the data dictionary.

A)user
B)DBMS
C)DBA
D)programmer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following DBMS evaluation categories does the following question relate to: Does the vendor of the DBMS supply printed or online training manuals and how good are the manuals?

A)Portability
B)Performance
C)Cost
D)Documentation and training
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following DBMS evaluation categories does the following question relate to: On what operating system and hardware is the DBMS supported?

A)Concurrent update
B)Security
C)Integrity
D)Limitations
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas?

A)Backup and recovery
B)Security
C)Integrity
D)Replication and distributed databases
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export?

A)Cost
B)Future plans
C)Portability
D)Performance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The DBA uses views and the SQL ____________________ statement as two security mechanisms.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
With just two exceptions,the DBA grants access and update privileges to the production system only to authorized users. What are the exceptions?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
A configuration of several computers connected together that allow users to share a variety of hardware and software resources is known as a(n) ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
If users access only certain fields in a table,you can improve performance by ____________________ the tables into two or more tables that each have the same primary key as the original and that collectively contain all the fields from the original table.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
The ____________________ strictly controls the production system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
____________________ help means that if a user is having trouble and asks for help,the DBMS will provide assistance for the particular feature being used at the time the user asks for help.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is the DBA's role with regard to access privileges?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What can the DBA do if the organization has no additional money for its production system but needs further performance improvements?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What is a hot site? What is a warm site? What is the difference between the two?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
The hardware,software,and database for the users is called the ____________________ system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Discuss the steps that organizations take to protect their data against hard drive failures and electrical power interruptions or outages.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.