Exam 15: Database Administration and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.

(Multiple Choice)
4.8/5
(29)

In the context of data quality management tools, software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.

(Short Answer)
5.0/5
(33)

When performing user access management, a DBA defines each user to the database at the levels.

(Multiple Choice)
4.7/5
(32)

Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure.

(True/False)
4.8/5
(30)

At the level of middle management, the database must be able to .

(Multiple Choice)
4.9/5
(40)

The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization.

(True/False)
4.9/5
(27)

In the context of database security measures, enforcing complex password policies will address the security vulnerabilities of the operating system component.

(True/False)
4.9/5
(34)

In the context of an organization's managerial structure, decisions are short term and affect only daily operations; for example, deciding to change the price of a product to clear it from inventory.

(Short Answer)
4.9/5
(30)

CASE tools provide support for the coding and implementation phases.

(Multiple Choice)
4.8/5
(33)

User-access management is a subset of .

(Multiple Choice)
4.7/5
(26)

are written instructions that describe a series of steps to be followed during the performance of a given activity.

(Multiple Choice)
4.9/5
(25)

In the context of developing a data administration strategy, a(n) provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools.

(Multiple Choice)
4.9/5
(36)

Incremental backups produce a backup of all data.

(True/False)
4.9/5
(35)

A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

(True/False)
4.9/5
(33)

The component of a CASE tool produces the information system's input/output formats.

(Multiple Choice)
5.0/5
(45)

The administrator is responsible for strategic planning.

(Multiple Choice)
4.8/5
(35)

A(n) data dictionary is automatically updated by the DBMS with every database access.

(Multiple Choice)
4.9/5
(34)

The DBA interacts with the end user by providing data and information support services to the organization's departments.

(True/False)
4.8/5
(33)

In case a company installs several incompatible databases and assigns a DBA for each of them, the general coordinator of all such DBAs is known as the administrator.

(Short Answer)
4.8/5
(35)

The person responsible for the control of the centralized and shared database is the database .

(Multiple Choice)
5.0/5
(32)
Showing 41 - 60 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)