Exam 14: Data and Database Administration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A disadvantage of signature dependency maintenance is that it may lead to excessive recompilation of dependent objects by the DBMS.

Free
(True/False)
4.8/5
(29)
Correct Answer:
Verified

False

One of the responsibilities of the data administrator is to establish standards for data naming conventions for the databases in the enterprise.

Free
(True/False)
4.7/5
(36)
Correct Answer:
Verified

True

A typical way to retrieve information from the data dictionary of a relational database is to use:

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

B

DBMSs used in highly sensitive areas such as national defense and intelligence gathering must be able to support mandatory access controls.

(True/False)
4.8/5
(34)

The first step in the DBMS selection and evaluation process is a detailed analysis of the requirements,which usually include data definition support,procedural and nonprocedural access,and recovery management.

(True/False)
5.0/5
(34)

Often the level of data quality that is sufficient for business operations meets or exceeds the level necessary for upper management decision making.

(True/False)
4.8/5
(32)

____________________ is a database security approach in which users are assigned access privileges to specific parts of a database.

(Short Answer)
4.8/5
(27)

In distributed database environments,the word "distributed" refers to the following:

(Multiple Choice)
4.7/5
(36)

Object databases arose from the need to integrate traditional types of data with non-traditional types of data in the same database.

(True/False)
4.8/5
(36)

The stages of information transformation that each entity in an organization goes through are collectively known as its ________________________.

(Short Answer)
4.9/5
(38)

___________________ is a database security approach in which a user can access a database element if their clearance level provides access to the classification level of that element.

(Short Answer)
4.9/5
(33)

The poor choice of a DBMS will usually not cause:

(Multiple Choice)
4.9/5
(38)

Which of the following is not an example of transaction processing?

(Multiple Choice)
4.8/5
(30)

Which of the following information is usually not provided by a data dictionary?

(Multiple Choice)
4.8/5
(30)

The persons playing the most important role in the overall information systems planning process are:

(Multiple Choice)
5.0/5
(35)

Development of an enterprise data model is one of the most important responsibilities of the data administrator.

(True/False)
4.8/5
(43)

For complex integrity constraints beyond the capability of CHECK constraints,SQL:2003 provides for ___________________,which can be used for constraints involving multiple tables and statistical calculations.

(Short Answer)
4.8/5
(33)

Two forms of authorization controls are _________ and ____________?

(Multiple Choice)
4.8/5
(31)

The information systems planning process does not involve the development of:

(Multiple Choice)
4.9/5
(32)

SQL:2003 provides a limited ability to define new data types using the CREATE DOMAIN statement.A domain can be created as a subset of a standard data type.

(True/False)
4.7/5
(34)
Showing 1 - 20 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)