Exam 16: Database Administration and Security
Exam 1: Database Systems72 Questions
Exam 2: Data Models75 Questions
Exam 3: The Relational Database Model74 Questions
Exam 4: Entity Relationship Ermodeling75 Questions
Exam 5: Advanced Data Modeling83 Questions
Exam 6: Normalization of Database Tables92 Questions
Exam 7: Introduction to Structured Query Language SQL92 Questions
Exam 8: Advanced SQL95 Questions
Exam 9: Database Design87 Questions
Exam 10: Transaction Management and Concurrency Control76 Questions
Exam 11: Database Performance Tuning and Query Optimization82 Questions
Exam 12: Distributed Database Management Systems72 Questions
Exam 13: Business Intelligence and Data Warehouses75 Questions
Exam 14: Big Data Analytics and NoSQL76 Questions
Exam 15: Database Connectivity and Web Technologies81 Questions
Exam 16: Database Administration and Security81 Questions
Select questions type
Backups must be clearly identified through detailed descriptions and date information,assuring that the correct backup is used to recover the database.
(True/False)
4.9/5
(30)
Concurrent backups take place while the user is working on the database.
(True/False)
4.7/5
(46)
Security breaches can yield a database whose integrity is either preserved or corrupted.
(True/False)
4.8/5
(31)
An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.
(True/False)
4.8/5
(36)
In the context of the Oracle Enterprise Manager,a is a named collection of settings that control how much of the database resource a given user can use.
(Multiple Choice)
4.9/5
(26)
In the context of developing a data administration strategy,a(n)provides a framework that includes computerized,automated,and integrated tools such as a DBMS and CASE tools.
(Multiple Choice)
4.9/5
(40)
A full backup,or database dump,produces a complete copy of the entire database.
(True/False)
4.8/5
(30)
A(n)plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time.
(Multiple Choice)
4.9/5
(33)
In the context of the advancements in DBMS technology,the use of data services can free the DBA from many lower-level technology-oriented tasks.
(Short Answer)
4.8/5
(24)
A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
(True/False)
4.8/5
(28)
The person responsible for the control of the centralized and shared database is the database .
(Multiple Choice)
4.9/5
(43)
CASE tools provide support for the coding and implementation phases.
(Multiple Choice)
4.9/5
(29)
In the context of database usage monitoring,a(n)is a file that automatically records a brief description of the database operations performed by all users.
(Multiple Choice)
4.8/5
(35)
Based on the type of decision-making support required,database users may be classified into: operational,tactical,or _____.
(Short Answer)
4.7/5
(37)
In the context of ensuring integrity of a database,a(n)transaction is one that does not overload the DBMS.
(Short Answer)
4.8/5
(31)
In the context of the Oracle Enterprise Manager,a(n)is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.
(Multiple Choice)
4.8/5
(30)
The ,also known as the information resource manager (IRM),usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA,although the two roles can overlap.
(Short Answer)
4.9/5
(34)
The DBA interacts with the end user by providing data and information support services to the organization's departments.
(True/False)
4.8/5
(34)
The use of cloud-based data services alters and expands the typical DBA's role in both technical and managerial dimensions.What is the DBA's role in this environment?
(Essay)
4.8/5
(42)
Showing 41 - 60 of 81
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)