Exam 15: Database Administration and Security
Exam 1: Database Systems70 Questions
Exam 2: Data Models70 Questions
Exam 3: The Relational Database Model100 Questions
Exam 4: Entity Relationship (ER)Modeling100 Questions
Exam 5: Advanced Data Modeling70 Questions
Exam 6: Normalization of Database Tables100 Questions
Exam 7: Introduction to Structured Query Language (SQL)100 Questions
Exam 8: Advanced SQL100 Questions
Exam 9: Database Design100 Questions
Exam 10: Transaction Management and Concurrency Control70 Questions
Exam 11: Database Performance Tuning and Query Optimization70 Questions
Exam 12: Distributed Database Management Systems70 Questions
Exam 13: Business Intelligence and Data Warehouses100 Questions
Exam 14: Database Connectivity and Web Technologies100 Questions
Exam 15: Database Administration and Security100 Questions
Select questions type
An organization is subject to a(n)_________________________ cycle;that is,the data user applies intelligence to data to produce information that is the basis of knowledge used in decision making by the user.
Free
(Short Answer)
4.8/5
(34)
Correct Answer:
data-information-decision
Most of today's successful organizations depend on the ____________________ database to provide support for all of their operations-from design to implementation,from sales to services,and from daily decision making to strategic planning.
Free
(Short Answer)
4.8/5
(24)
Correct Answer:
enterprise
A full backup,or database dump,produces a complete copy of the entire database.
Free
(True/False)
4.7/5
(38)
Correct Answer:
True
The DBA's function includes educating the ____________________ in the services provided and how those services enhance data stewardship and data security.
(Short Answer)
4.8/5
(35)
One of the important functions provided by the database ____ is to reserve the resources that must be used by the database at run time.
(Multiple Choice)
4.8/5
(41)
The advent of the DBMS and its shared view of data produced a new level of data management sophistication and led the DP department to evolve into a(n)_________________________ department.
(Short Answer)
5.0/5
(35)
A ____ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.
(Multiple Choice)
4.9/5
(39)
A(n)____ plan is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.
(Multiple Choice)
4.9/5
(39)
The storage locations for multiple backups must include sites inside and outside the organization.
(True/False)
4.8/5
(27)
In the IBM DB2 system catalog tables,____________________ stores one row for each column of each table or view.
(Short Answer)
4.8/5
(35)
The DBA's ____ role is focused on personnel management and on interactions with the end-user community.
(Multiple Choice)
4.8/5
(35)
The most common backup medium has traditionally been ____________________.
(Short Answer)
4.8/5
(32)
____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
(Multiple Choice)
4.7/5
(40)
A(n)____ data dictionary is not updated automatically and usually requires a batch process to be run.
(Multiple Choice)
4.8/5
(35)
In large organizations,the DSO's activities are often classified as ____________________ management.
(Short Answer)
4.9/5
(26)
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
(True/False)
4.8/5
(30)
____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.
(Multiple Choice)
4.9/5
(35)
The person responsible for the control of the centralized and shared database is the database ____.
(Multiple Choice)
4.9/5
(40)
The DBA must review the database application design to ensure that transactions are ____________________,meaning that they do not overload the DBMS.
(Short Answer)
4.8/5
(32)
A security ____________________ is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
(Short Answer)
4.9/5
(37)
Showing 1 - 20 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)