Exam 12: Database Administration and Security
Exam 1: The Database Approach70 Questions
Exam 2: Database Development Process100 Questions
Exam 3: Data Models70 Questions
Exam 4: Relational Model Characteristics100 Questions
Exam 5: Beginning Structured Query Language Sql100 Questions
Exam 6: Procedural Language Sql and Advanced Sql100 Questions
Exam 7: Data Modeling With Entity Relationship Diagrams100 Questions
Exam 8: Data Modeling Advanced Concepts70 Questions
Exam 9: Normalizing Database Designs100 Questions
Exam 10: Distributed Databases70 Questions
Exam 11: Interacting With Databases Through the Web100 Questions
Exam 12: Database Administration and Security100 Questions
Exam 13: Managing Transactions and Concurrency70 Questions
Exam 14: Managing Database and Sql Performance70 Questions
Exam 15: Databases for Decision Support100 Questions
Select questions type
When introducing a database into an organization, a(n) ____ impact is likely because the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions.
(Multiple Choice)
4.9/5
(35)
The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization.
(True/False)
4.9/5
(34)
Procedures and standards must be revised at least ____ to keep them up-to-date.
(Multiple Choice)
4.9/5
(37)
____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
(Multiple Choice)
4.7/5
(34)
A(n) ____ plan is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.
(Multiple Choice)
4.9/5
(31)
A security ____________________ is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
(Short Answer)
4.7/5
(40)
____ are written instructions that describe a series of steps to be followed during the performance of a given activity.
(Multiple Choice)
4.8/5
(30)
The most common backup medium has traditionally been ____________________.
(Short Answer)
4.8/5
(42)
At the level of middle management, the database must be able to ____.
(Multiple Choice)
4.9/5
(32)
The DBA must periodically generate a(n) ____________________ report to determine whether there have been actual or attempted security violations-and, if so, from what locations, and if possible, by whom.
(Short Answer)
4.7/5
(27)
____ are general statements of direction or action that communicate and support DBA goals.
(Multiple Choice)
4.8/5
(27)
System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
(True/False)
4.7/5
(34)
The DBA's function includes educating the ____________________ in the services provided and how those services enhance data stewardship and data security.
(Short Answer)
4.9/5
(27)
The maintenance activities of the DBA are an extension of the operational activities.
(True/False)
4.8/5
(35)
____ management is designed to limit access to the database.
(Multiple Choice)
4.9/5
(39)
____________________ decisions are short term and affect only daily operations; for example, deciding to change the price of a product to clear it from inventory.
(Short Answer)
4.8/5
(35)
____________________ focuses on maintaining the data free of inconsistencies and anomalies.
(Short Answer)
5.0/5
(38)
An access ____________________ describes the type of authorized access.
(Short Answer)
4.8/5
(35)
The allocation of storage resources is determined when the DBMS is created.
(True/False)
4.9/5
(41)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)