Exam 14: Data and Database Administration
Exam 1: Introduction to Database Management76 Questions
Exam 2: Introduction to Database Development76 Questions
Exam 3: The Relational Data Model75 Questions
Exam 4: Query Formulation With SQL75 Questions
Exam 5: Understanding Entity Relations76 Questions
Exam 6: Developing Data Models for Business Databases75 Questions
Exam 7: Normalization of Relational Tables76 Questions
Exam 8: Physical Database Design76 Questions
Exam 9: Advanced Query Formulation With SQL74 Questions
Exam 10: Application Development With Views75 Questions
Exam 11: Stored Procedures and Triggers76 Questions
Exam 12: View Design and Integration76 Questions
Exam 14: Data and Database Administration76 Questions
Exam 15: Transaction Management75 Questions
Exam 16: Data Warehouse Technology and Management78 Questions
Exam 17: Client-Server Processing and Distributed Databases76 Questions
Exam 18: Object Database Management Systems83 Questions
Select questions type
A disadvantage of signature dependency maintenance is that it may lead to excessive recompilation of dependent objects by the DBMS.
Free
(True/False)
4.8/5
(29)
Correct Answer:
False
One of the responsibilities of the data administrator is to establish standards for data naming conventions for the databases in the enterprise.
Free
(True/False)
4.7/5
(36)
Correct Answer:
True
A typical way to retrieve information from the data dictionary of a relational database is to use:
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
B
DBMSs used in highly sensitive areas such as national defense and intelligence gathering must be able to support mandatory access controls.
(True/False)
4.8/5
(34)
The first step in the DBMS selection and evaluation process is a detailed analysis of the requirements,which usually include data definition support,procedural and nonprocedural access,and recovery management.
(True/False)
5.0/5
(34)
Often the level of data quality that is sufficient for business operations meets or exceeds the level necessary for upper management decision making.
(True/False)
4.8/5
(32)
____________________ is a database security approach in which users are assigned access privileges to specific parts of a database.
(Short Answer)
4.8/5
(27)
In distributed database environments,the word "distributed" refers to the following:
(Multiple Choice)
4.7/5
(36)
Object databases arose from the need to integrate traditional types of data with non-traditional types of data in the same database.
(True/False)
4.8/5
(36)
The stages of information transformation that each entity in an organization goes through are collectively known as its ________________________.
(Short Answer)
4.9/5
(38)
___________________ is a database security approach in which a user can access a database element if their clearance level provides access to the classification level of that element.
(Short Answer)
4.9/5
(33)
Which of the following is not an example of transaction processing?
(Multiple Choice)
4.8/5
(30)
Which of the following information is usually not provided by a data dictionary?
(Multiple Choice)
4.8/5
(30)
The persons playing the most important role in the overall information systems planning process are:
(Multiple Choice)
5.0/5
(35)
Development of an enterprise data model is one of the most important responsibilities of the data administrator.
(True/False)
4.8/5
(43)
For complex integrity constraints beyond the capability of CHECK constraints,SQL:2003 provides for ___________________,which can be used for constraints involving multiple tables and statistical calculations.
(Short Answer)
4.8/5
(33)
Two forms of authorization controls are _________ and ____________?
(Multiple Choice)
4.8/5
(31)
The information systems planning process does not involve the development of:
(Multiple Choice)
4.9/5
(32)
SQL:2003 provides a limited ability to define new data types using the CREATE DOMAIN statement.A domain can be created as a subset of a standard data type.
(True/False)
4.7/5
(34)
Showing 1 - 20 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)