Deck 14: Data and Database Administration
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/76
Play
Full screen (f)
Deck 14: Data and Database Administration
1
Metadata can be found in the information resource dictionary.
True
2
One of the responsibilities of the data administrator is to establish standards for data naming conventions for the databases in the enterprise.
True
3
Development of an enterprise data model is one of the most important responsibilities of the data administrator.
True
4
A disadvantage of signature dependency maintenance is that it may lead to excessive recompilation of dependent objects by the DBMS.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
5
Since most DBMSs are very good at managing database dependencies,the DBA does not usually need to be knowledgeable or concerned about dependency maintenance for actions on referenced objects.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
6
With discretionary access control,users may be individually given access rights to specific data,or these access privileges may be granted to groups of users.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
7
One of the main problems with the independent development of separate operational databases is that decision-making information for the overall organization is not readily available.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
8
The cost of switching to a different DBMS may include data conversion,software recoding,and retraining employees,and can be much higher than the original purchase price of the DBMS.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
9
SQL:2003 provides a limited ability to define new data types using the CREATE DOMAIN statement.A domain can be created as a subset of a standard data type.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
10
One of the responsibilities of the data administrator is to monitor the performance of the enterprise's databases.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
11
The first step in the DBMS selection and evaluation process is a detailed analysis of the requirements,which usually include data definition support,procedural and nonprocedural access,and recovery management.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
12
The data administrator (DA)is a support role with responsibilities related to individual databases and DBMSs.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
13
SQL:2003 ASSERTIONS are more powerful than CHECK constraints because they are not associated with a specific table,and they can involve a SELECT statement of any complexity.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
14
Because benchmarks need to be specific to a particular organization's needs in order to be useful,an organization should develop their own benchmarks for DBMS evaluation.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
15
Prior to the final DBMS selection process,the top two or three candidates should be evaluated against a set of benchmarks.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
16
The SQL:2003 Definition_Schema and Information_Schema have not been implemented by most DBMSs.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
17
DBMSs used in highly sensitive areas such as national defense and intelligence gathering must be able to support mandatory access controls.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
18
Although a DBA writes stored procedures and triggers to help manage databases,the primary responsibilities for a DBA are to manage stored procedures and triggers,not to write them.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
19
Often the level of data quality that is sufficient for business operations meets or exceeds the level necessary for upper management decision making.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
20
The operational level of management deals with individual transactions and exception reports.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
21
The SQL statement to remove and access privilege is:
A) the GRANT statement
B) the CREATE statement
C) the REMOVE statement
D) the REVOKE statement
A) the GRANT statement
B) the CREATE statement
C) the REMOVE statement
D) the REVOKE statement
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
22
Given the tremendously expanding interest in Internet commerce,the importance of transaction processing is projected to diminish.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
23
The following level of management deals with summarized,integrated operational databases:
A) Strategic
B) Tactical
C) Operational
D) None of the above
A) Strategic
B) Tactical
C) Operational
D) None of the above
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is primarily used for security?
A) Logical database design rules
B) Authentication rules
C) View integration
D) CREATE TABLE statements
A) Logical database design rules
B) Authentication rules
C) View integration
D) CREATE TABLE statements
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
25
Distributed environments can be used to support transaction processing,but not data warehousing.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
26
Two forms of authorization controls are _________ and ____________?
A) Discretionary Access Control / Mandatory Access Control
B) Public key / Private key
C) Primary key / Foreign key
D) Internal Access Control / External Access Control
A) Discretionary Access Control / Mandatory Access Control
B) Public key / Private key
C) Primary key / Foreign key
D) Internal Access Control / External Access Control
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following statements is not true of triggers:
A) The DBMS will automatically recompile a trigger if a referenced object is deleted
B) Triggers should not perform integrity constraints that can otherwise be performed with CHECK constraints and assertions
C) The choice between using a database trigger versus an application trigger is usually fairly clear
D) A and C are both not true
A) The DBMS will automatically recompile a trigger if a referenced object is deleted
B) Triggers should not perform integrity constraints that can otherwise be performed with CHECK constraints and assertions
C) The choice between using a database trigger versus an application trigger is usually fairly clear
D) A and C are both not true
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following would be a dependency concern to be monitored by the DBA?
A) Access plan obsolescence
B) Modification of referenced objects
C) Deletion of referenced objects
D) All of the above
A) Access plan obsolescence
B) Modification of referenced objects
C) Deletion of referenced objects
D) All of the above
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
29
After execution of the commands SQL#1,SQL#2,and SQL#3,a member of the user group Personnel2 may:
A) Access the Salary of an Employee whose job is 'Clerk'
B) Change the Salary of any Employee
C) Access the Salary of any Employee
D) Change the Salary of an Employee whose job is 'Clerk'
A) Access the Salary of an Employee whose job is 'Clerk'
B) Change the Salary of any Employee
C) Access the Salary of any Employee
D) Change the Salary of an Employee whose job is 'Clerk'
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
30
Inconsistency of customer names across operational databases typically would negatively affect the decision making of:
A) Strategic management
B) Tactical management
C) Operational management
D) Low level management
A) Strategic management
B) Tactical management
C) Operational management
D) Low level management
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
31
After execution of the commands SQL#1,SQL#2,and SQL#3,a member of the user group Personnel1 may:
A) Change the Salary of any Employee
B) Access the Salary of any Employee
C) Change the Salary of an Employee whose job is 'Clerk'
D) All of the above
A) Change the Salary of any Employee
B) Access the Salary of any Employee
C) Change the Salary of an Employee whose job is 'Clerk'
D) All of the above
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following descriptions will usually qualify as a trigger?
A) DBMS denies inserting a row with a null key and warns the user with an error message
B) On sale of an item in the supermarket, inventory is updated and management is advised to restock the item
C) On entering nonexisting department number for a new employee in the table Employee, DBMS denies inserting the new row and warns the user with an error message
D) On entering nonexisting department number for a new employee in the table Employee, DBMS inserts a null value for the department number and warns the user
A) DBMS denies inserting a row with a null key and warns the user with an error message
B) On sale of an item in the supermarket, inventory is updated and management is advised to restock the item
C) On entering nonexisting department number for a new employee in the table Employee, DBMS denies inserting the new row and warns the user with an error message
D) On entering nonexisting department number for a new employee in the table Employee, DBMS inserts a null value for the department number and warns the user
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
33
Data administrators may specialize in:
A) database planning
B) policy establishment
C) data ownership and data sharing
D) all of the above
A) database planning
B) policy establishment
C) data ownership and data sharing
D) all of the above
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
34
The following level of management deals with external data sources and summarized tactical databases:
A) Strategic
B) Tactical
C) Operational
D) Middle level
A) Strategic
B) Tactical
C) Operational
D) Middle level
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
35
After execution of the commands SQL#1 and SQL#2,a member of the user group Personnel2 may:
A) Change the Salary of any Employee
B) Access the Salary of any Employee
C) Change the Salary of an Employee whose job is 'Clerk'
D) All of the above
A) Change the Salary of any Employee
B) Access the Salary of any Employee
C) Change the Salary of an Employee whose job is 'Clerk'
D) All of the above
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
36
In a DBMS environment,processing can be distributed over different computers,but the data itself cannot be distributed.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
37
Object databases arose from the need to integrate traditional types of data with non-traditional types of data in the same database.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following needs not be explicitly invoked to be executed?
A) A stored procedure
B) A trigger
C) A SQL CREATE TABLE statement
D) A SELECT statement
A) A stored procedure
B) A trigger
C) A SQL CREATE TABLE statement
D) A SELECT statement
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
39
In distributed database environments,the word "distributed" refers to the fact that database administration responsibilities may be distributed among various database administrators.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
40
Strategic management would be mostly interested in the following type of data:
A) Economic forecasts
B) Supplier performance
C) Daily production results
D) Employee schedules
A) Economic forecasts
B) Supplier performance
C) Daily production results
D) Employee schedules
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
41
A typical way to retrieve information from the data dictionary of a relational database is to use:
A) A Cobol application program
B) A SQL SELECT statement
C) A trigger
D) A CREATE DOMAIN statement
A) A Cobol application program
B) A SQL SELECT statement
C) A trigger
D) A CREATE DOMAIN statement
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
42
Switching from a badly chosen DBMS to a good DBMS will typically involve the following costs:
A) Data conversion
B) Recoding software
C) Retraining employees
D) All of the above
A) Data conversion
B) Recoding software
C) Retraining employees
D) All of the above
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
43
___________________ is a database security approach in which a user can access a database element if their clearance level provides access to the classification level of that element.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
44
Rules which are stored in the database security system defining authorized users,allowable operations and accessible parts of the database are called _______________________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
45
The stages of information transformation that each entity in an organization goes through are collectively known as its ________________________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
46
A(n)___________________ database directly supports the major,daily functions of an organization.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
47
In distributed database environments,the word "distributed" refers to the following:
A) Applications may be distributed on different computer systems
B) Functions may be distributed on different computer systems
C) Data may be distributed on different computer systems
D) All of the above
A) Applications may be distributed on different computer systems
B) Functions may be distributed on different computer systems
C) Data may be distributed on different computer systems
D) All of the above
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
48
The information systems planning process does not involve the development of:
A) Detailed operational databases
B) Enterprise models of data
C) Enterprise models of processes
D) Organizational roles
A) Detailed operational databases
B) Enterprise models of data
C) Enterprise models of processes
D) Organizational roles
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
49
The SQL:2003 statement to create a user role that is allowed to assign their role to another user is ________________________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
50
_______________________ is the concept of combining information technology with human and organizational capabilities to support rapid adaptation to change.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
51
The persons playing the most important role in the overall information systems planning process are:
A) Database administrators
B) Data administrators
C) Application programmers
D) Database designers
A) Database administrators
B) Data administrators
C) Application programmers
D) Database designers
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
52
____________________ is a database security approach in which users are assigned access privileges to specific parts of a database.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is not an example of transaction processing?
A) Processing 5-year sales data for market analysis
B) Processing monthly payroll
C) Producing year-end tax information for each employee
D) Processing a health insurance claim
A) Processing 5-year sales data for market analysis
B) Processing monthly payroll
C) Producing year-end tax information for each employee
D) Processing a health insurance claim
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
54
The protection of databases from unauthorized access and malicious destruction is generally known as ___________________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
55
The data dictionary of a relational database is organized as a:
A) relational database
B) file catalog similar to Windows' file catalog
C) hierarchical database
D) large file
A) relational database
B) file catalog similar to Windows' file catalog
C) hierarchical database
D) large file
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
56
___________________ rules are checked when a user first connects to a DBMS.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
57
The poor choice of a DBMS will usually not cause:
A) A bad conceptual database design
B) A slow performance
C) Possible loss of sales
D) The need to switch to a better database
A) A bad conceptual database design
B) A slow performance
C) Possible loss of sales
D) The need to switch to a better database
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is an example of data warehouse processing?
A) Processing 5-year sales data for market analysis
B) Processing monthly payroll
C) Producing year-end tax information for each employee
D) Processing a health insurance claim
A) Processing 5-year sales data for market analysis
B) Processing monthly payroll
C) Producing year-end tax information for each employee
D) Processing a health insurance claim
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following information is usually not provided by a data dictionary?
A) Tables
B) Views
C) Users rights
D) Database Entity Relationship Diagrams
A) Tables
B) Views
C) Users rights
D) Database Entity Relationship Diagrams
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
60
A conceptual data model of an entire organization,which is used for data planning and decision support,is called a(n)_______________________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
61
For remotely stored procedures and functions,when ____________________ dependency maintenance is used,the DBMS will recompile a dependent object when any change is made to the referenced objects.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
62
Data that describes the source,use,value,and meaning of other data is known as ______________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
63
_____________________ is a term for the situation that exists in many organizations in which technology supports the local objectives of the organization but not the global objectives.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
64
Tables with the names USERS,DOMAINS,COLUMNS,and REFERENTIAL_CONSTRAINTS would be examples of important ________________________ found in the SQL:2003 Definition_Schema.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
65
A database that contains metadata describing the entire information systems life cycle is known as a(n)____________________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
66
A(n)___________________ is a special database provided by the DBMS that tracks tables,columns,assertions,indexes,and other objects that are managed by the DBMS.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
67
The process of developing enterprise models of an organization's data,processes,and roles is called _______________________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
68
In the DBMS evaluation process,a useful decision theory technique known as the ___________________ can be employed by the DBA to assign weights to pairwise combinations of requirement groups for analysis.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
69
One method to ensure data integrity that involves row conditions on columns of the same table is to use a __________ constraint in the CREATE TABLE statement.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
70
A(n)____________________ is a workload used to evaluate the performance of a system or product.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
71
In the process known as ______________,an algorithm converts data from plaintext into ciphertext to obscure its meaning.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
72
List the three components of the SQL:2003 GRANT statement: ______________________________
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
73
The SQL:2003 ____________________ statement allows you to define a new data type as a subset of a standard data type.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
74
For remotely stored procedures and functions,when ____________________ dependency maintenance is used,recompilation of an object will occur when a parameter name or usage changes.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
75
To support object-oriented databases,SQL:2003 provides for ________________,which are more powerful than domains or distinct types and can be defined with new operators and functions.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
76
For complex integrity constraints beyond the capability of CHECK constraints,SQL:2003 provides for ___________________,which can be used for constraints involving multiple tables and statistical calculations.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck