Exam 12: Data and Database Administration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the four basic facilities that a database management system should provide for backup and recovery?

(Essay)
4.7/5
(46)

A device to measure or detect fingerprints or signatures is called a(n) ________ device.

(Multiple Choice)
4.8/5
(44)

Allocating 10 percent over suggested installation space is sufficient for a DBMS.

(True/False)
4.7/5
(31)

A key component of the Sarbanes-Oxley Act was enacted to ensure the integrity of IT infrastructure in use within an organization.

(True/False)
4.9/5
(27)

Open-source software always comes with complete documentation.

(True/False)
4.8/5
(31)

Database applications are not very disk intensive.

(True/False)
4.7/5
(38)

The record log is a record of the essential data for each transaction that has been processed against the database.

(True/False)
4.8/5
(35)

What threats to data security must be addressed in a comprehensive data security plan?

(Essay)
4.7/5
(31)

While views promote security by restricting user access to data, they are not adequate security measures because:

(Multiple Choice)
4.7/5
(34)

What are the most important security features for data management software?

(Essay)
4.9/5
(34)

A domain is a way to create a structure that acts like a table.

(True/False)
4.9/5
(36)

With ________, the database itself is lost, destroyed, or cannot be read.

(Multiple Choice)
4.8/5
(32)

Backward recovery starts with an earlier copy of the database.

(True/False)
4.8/5
(32)

Any data that are retrieved by a user for updating must be locked until the update is completed or aborted.

(True/False)
4.8/5
(34)

________ is used to undo unwanted database changes.

(Multiple Choice)
4.8/5
(33)

The extent of the database resource that is included with each lock is called the level of:

(Multiple Choice)
4.8/5
(31)

The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.

(True/False)
4.8/5
(35)

The granularity of locking is not a critical decision in database design.

(True/False)
4.7/5
(29)

An optimistic approach to concurrency control is called:

(Multiple Choice)
5.0/5
(28)

A shared lock allows other transactions to read but not update records in use.

(True/False)
4.9/5
(38)
Showing 21 - 40 of 110
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)