Exam 12: Data and Database Administration
Exam 1: The Database Environment and Development Process116 Questions
Exam 2: Modeling Data in the Organization103 Questions
Exam 3: The Enhanced E-R Model103 Questions
Exam 4: Logical Database Design and the Relational Model102 Questions
Exam 5: Physical Database Design and Performance103 Questions
Exam 6: Introduction to SQL105 Questions
Exam 7: Advanced SQL107 Questions
Exam 8: Database Application Development105 Questions
Exam 9: Data Warehousing103 Questions
Exam 10: Data Quality and Integration105 Questions
Exam 11: Big Data and Analytics102 Questions
Exam 12: Data and Database Administration110 Questions
Exam 13: Distributed Databases100 Questions
Exam 14: Object-Oriented Data Modeling105 Questions
Select questions type
What are the four basic facilities that a database management system should provide for backup and recovery?
(Essay)
4.7/5
(46)
A device to measure or detect fingerprints or signatures is called a(n) ________ device.
(Multiple Choice)
4.8/5
(44)
Allocating 10 percent over suggested installation space is sufficient for a DBMS.
(True/False)
4.7/5
(31)
A key component of the Sarbanes-Oxley Act was enacted to ensure the integrity of IT infrastructure in use within an organization.
(True/False)
4.9/5
(27)
The record log is a record of the essential data for each transaction that has been processed against the database.
(True/False)
4.8/5
(35)
What threats to data security must be addressed in a comprehensive data security plan?
(Essay)
4.7/5
(31)
While views promote security by restricting user access to data, they are not adequate security measures because:
(Multiple Choice)
4.7/5
(34)
What are the most important security features for data management software?
(Essay)
4.9/5
(34)
With ________, the database itself is lost, destroyed, or cannot be read.
(Multiple Choice)
4.8/5
(32)
Any data that are retrieved by a user for updating must be locked until the update is completed or aborted.
(True/False)
4.8/5
(34)
The extent of the database resource that is included with each lock is called the level of:
(Multiple Choice)
4.8/5
(31)
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
(True/False)
4.8/5
(35)
The granularity of locking is not a critical decision in database design.
(True/False)
4.7/5
(29)
A shared lock allows other transactions to read but not update records in use.
(True/False)
4.9/5
(38)
Showing 21 - 40 of 110
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)