Exam 12: Data and Database Administration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Correct installation of the DBMS product is essential to any environment.

Free
(True/False)
4.7/5
(29)
Correct Answer:
Verified

True

A repository of information about a database that documents data elements of a database is called a:

Free
(Multiple Choice)
4.7/5
(43)
Correct Answer:
Verified

D

________ is a technical function responsible for database design, security, and disaster recovery.

Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
Verified

B

Examination and modification of the SQL code in an application may lead to performance improvements.

(True/False)
4.9/5
(32)

Security measures for dynamic Web pages are different from static HTML pages because:

(Multiple Choice)
4.8/5
(31)

A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:

(Multiple Choice)
4.8/5
(30)

A high-level function that is responsible for the overall management of data resources in an organization is called database administration.

(True/False)
4.9/5
(35)

In order to perform a restore/rerun, the database must be mirrored.

(True/False)
4.8/5
(37)

The preferred method of fixing an aborted transaction is:

(Multiple Choice)
4.9/5
(38)

What are some of the core roles of the traditional data administrator?

(Essay)
4.9/5
(35)

Databases are generally the property of a single department within an organization.

(True/False)
4.7/5
(39)

Concurrent transactions need to be processed in isolation so that they do not interfere with each other.

(True/False)
4.8/5
(27)

Which of the following functions do cost/benefit models?

(Multiple Choice)
4.9/5
(26)

A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked.

(Multiple Choice)
4.8/5
(28)

Which of the following is NOT true of poor data and/or database administration?

(Multiple Choice)
4.7/5
(39)

The data administrator takes responsibility for the overall management of data resources.

(True/False)
4.8/5
(35)

What is backward and forward recovery?

(Essay)
4.8/5
(31)

Exclusive locks allow other transactions to read but not update a record or other resource.

(True/False)
4.8/5
(23)

The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme.

(True/False)
4.8/5
(35)

Controls incorporated into a data management system that restrict access to data are called authentication rules.

(True/False)
4.9/5
(34)
Showing 1 - 20 of 110
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)