Exam 12: Data and Database Administration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An audit trail of transactions and database changes is kept by a journalizing facility.

(True/False)
4.9/5
(38)

Guidelines for server security should include all of the following EXCEPT:

(Multiple Choice)
4.7/5
(29)

The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.

(True/False)
4.8/5
(37)

The restore/rerun technique involves reprocessing the day's transactions against the backup copy of the database.

(True/False)
4.7/5
(35)

The coding or scrambling of data so that humans cannot read them is called:

(Multiple Choice)
4.9/5
(31)

A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.

(True/False)
4.9/5
(41)

A typical cause of database destruction is a disk crash.

(True/False)
4.8/5
(41)

CASE tool-generated information should be fed into repositories.

(True/False)
5.0/5
(33)

A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.

(Multiple Choice)
4.9/5
(30)

A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

(Multiple Choice)
4.8/5
(32)

An organization should have one data warehouse administrator for every:

(Multiple Choice)
4.8/5
(38)

The Information Resource Lexicon System (IRLS) is a computer software tool used to manage and control access to the information repository.

(True/False)
4.8/5
(35)

Forward recovery is faster than restore/rerun because:

(Multiple Choice)
4.8/5
(36)

What are some of the core roles of a database administrator?

(Essay)
4.8/5
(41)

The transaction log contains before and after images of records that have been modified.

(True/False)
4.9/5
(28)

Which of the following is NOT a component of a repository system architecture?

(Multiple Choice)
4.7/5
(39)

Research shows that if an online customer does not get the service he or she expects within a few ________, the customer will switch to a competitor.

(Multiple Choice)
4.9/5
(30)

A checkpoint facility is a facility by which the DBMS refuses to accept any new transactions.

(True/False)
4.7/5
(36)

Sarbanes-Oxley Act was enacted to ensure the integrity of:

(Multiple Choice)
4.9/5
(39)

The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.

(Multiple Choice)
4.8/5
(45)
Showing 81 - 100 of 110
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)