Exam 12: Data and Database Administration
Exam 1: The Database Environment and Development Process116 Questions
Exam 2: Modeling Data in the Organization103 Questions
Exam 3: The Enhanced E-R Model103 Questions
Exam 4: Logical Database Design and the Relational Model102 Questions
Exam 5: Physical Database Design and Performance103 Questions
Exam 6: Introduction to SQL105 Questions
Exam 7: Advanced SQL107 Questions
Exam 8: Database Application Development105 Questions
Exam 9: Data Warehousing103 Questions
Exam 10: Data Quality and Integration105 Questions
Exam 11: Big Data and Analytics102 Questions
Exam 12: Data and Database Administration110 Questions
Exam 13: Distributed Databases100 Questions
Exam 14: Object-Oriented Data Modeling105 Questions
Select questions type
An audit trail of transactions and database changes is kept by a journalizing facility.
(True/False)
4.9/5
(38)
Guidelines for server security should include all of the following EXCEPT:
(Multiple Choice)
4.7/5
(29)
The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.
(True/False)
4.8/5
(37)
The restore/rerun technique involves reprocessing the day's transactions against the backup copy of the database.
(True/False)
4.7/5
(35)
The coding or scrambling of data so that humans cannot read them is called:
(Multiple Choice)
4.9/5
(31)
A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.
(True/False)
4.9/5
(41)
CASE tool-generated information should be fed into repositories.
(True/False)
5.0/5
(33)
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.
(Multiple Choice)
4.9/5
(30)
A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.
(Multiple Choice)
4.8/5
(32)
An organization should have one data warehouse administrator for every:
(Multiple Choice)
4.8/5
(38)
The Information Resource Lexicon System (IRLS) is a computer software tool used to manage and control access to the information repository.
(True/False)
4.8/5
(35)
The transaction log contains before and after images of records that have been modified.
(True/False)
4.9/5
(28)
Which of the following is NOT a component of a repository system architecture?
(Multiple Choice)
4.7/5
(39)
Research shows that if an online customer does not get the service he or she expects within a few ________, the customer will switch to a competitor.
(Multiple Choice)
4.9/5
(30)
A checkpoint facility is a facility by which the DBMS refuses to accept any new transactions.
(True/False)
4.7/5
(36)
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.
(Multiple Choice)
4.8/5
(45)
Showing 81 - 100 of 110
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)