Exam 8: Database Administration
Exam 1: Introduction to Database Management50 Questions
Exam 2: The Relational : Introduction, QBE, and Relational Algebra50 Questions
Exam 3: The Relational : SQL75 Questions
Exam 4: The Relational : Advanced Topics50 Questions
Exam 5: Database Design 1: Normalization50 Questions
Exam 6: Database Design 2: Design Method75 Questions
Exam 7: Dbms Functions50 Questions
Exam 8: Database Administration50 Questions
Exam 9: Database Management Approaches75 Questions
Select questions type
The DBA is responsible for DBMS maintenance,data dictionary management,and training.
(True/False)
4.9/5
(46)
An internal company network that uses software tools typically used on the Internet and World Wide Web is called an extranet.
(True/False)
4.9/5
(40)
The ____ is responsible for providing training in the use of the DBMS.
(Multiple Choice)
4.9/5
(44)
In most cases,access to every table and field in a database is a necessity for every user.
(True/False)
5.0/5
(38)
The _________________________ strictly controls the production system.
(Essay)
4.7/5
(46)
Damage to a database can occur through a physical incident such as an abnormally terminated program.
(True/False)
4.8/5
(40)
If a DBMS lacks essential security features,the _________________________ might create or purchase special security programs that provide the missing features.
(Essay)
4.9/5
(38)
A shared lock permits other users to read the data in the database.
(True/False)
4.8/5
(45)
The hardware,software,and database for the users is called the ____________________ system.
(Essay)
4.8/5
(31)
To implement and enforce security,the DBA uses such features as encryption and views.
(True/False)
4.8/5
(38)
When the primary key cannot be null,this is known as ____________________.
(Short Answer)
4.9/5
(42)
Tables with indexes allow faster searches,but slow performance on ____.
(Multiple Choice)
4.9/5
(28)
In order to develop new programs,the programmers need access to the information in the DBMS.They are given access to the ____.
(Multiple Choice)
4.8/5
(43)
A configuration of several computers connected together that allow users to share a variety of hardware and software resources is known as a(n)_________________________.
(Essay)
4.9/5
(44)
____ locks forbid any other user from accessing the data in any way.
(Multiple Choice)
4.9/5
(45)
By default,Access and other DBMSs create indexes automatically for the ____ keys.
(Multiple Choice)
4.8/5
(36)
With just two exceptions,the DBA grants access and update privileges to the production system only to authorized users.What are the exceptions?
(Essay)
4.9/5
(34)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)