Filters
Question type

Study Flashcards

The selection of the DBMS ____________________ involves asking the question,"Are the company's needs better served by a relational,object-oriented,or object/relational DBMS?"

Correct Answer

verifed

verified

____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.


A) Dangerous
B) Preserving
C) Corrupting
D) Authorized

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

A(n) ____ plan is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.


A) access
B) completion
C) application
D) communications

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

"All users must have passwords" is an example of a ____.


A) rule
B) policy
C) standard
D) procedure

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

____ are general statements of direction or action that communicate and support DBA goals.


A) Standards
B) Policies
C) Documentation
D) Procedures

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Some common physical security practices found in large database installations include secured entrances,password-protected workstations,____,closed-circuit video,and voice-recognition technology.


A) drug testing
B) fingerprinting
C) electronic personnel badges
D) retina scans

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.

A) True
B) False

Correct Answer

verifed

verified

It is common practice to define the DBA function by dividing the DBA operations according to the ____ phases.


A) SLA
B) DBLC
C) SDLC
D) MRA

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

In the IBM DB2 system catalog tables,____________________ stores one row for each column of each table or view.

Correct Answer

verifed

verified

An access ____________________ describes the type of authorized access.

Correct Answer

verifed

verified

Describe the need for convenient and safe backup storage.

Correct Answer

verifed

verified

There must be multiple backups of the sa...

View Answer

Protecting the data in the database is a function of authorization management.

A) True
B) False

Correct Answer

verifed

verified

Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.

A) True
B) False

Correct Answer

verifed

verified

The testing and evaluation of a database application cover all aspects of the system-from the simple collection and creation of data to its use and retirement.What is covered by the evaluation process?

Correct Answer

verifed

verified

Technical aspects of both the applicatio...

View Answer

The ____ administrator is responsible for strategic planning.


A) system
B) data
C) database
D) program

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

The ____________________,also known as the information resource manager (IRM),usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA,although the two roles overlap some.

Correct Answer

verifed

verified

DA
data ad...

View Answer

A ____ is a uniquely identifiable object that allows a given person to log on to the database.


A) user
B) role
C) profile
D) manager

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.

A) True
B) False

Correct Answer

verifed

verified

The general coordinator of all DBAs is sometimes known as the ____________________ administrator.

Correct Answer

verifed

verified

At the level of middle management,the database must be able to ____.


A) represent and support the company operations as closely as possible
B) deliver the data necessary for tactical decisions and planning
C) produce query results within specified performance levels
D) provide access to external and internal data to identify growth opportunities and to chart the direction of such growth

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 100

Related Exams

Show Answer