Exam 15: Database Administration and Security
Exam 1: Database Systems70 Questions
Exam 2: Data Models70 Questions
Exam 3: The Relational Database Model100 Questions
Exam 4: Entity Relationship (ER)Modeling100 Questions
Exam 5: Advanced Data Modeling70 Questions
Exam 6: Normalization of Database Tables100 Questions
Exam 7: Introduction to Structured Query Language (SQL)100 Questions
Exam 8: Advanced SQL100 Questions
Exam 9: Database Design100 Questions
Exam 10: Transaction Management and Concurrency Control70 Questions
Exam 11: Database Performance Tuning and Query Optimization70 Questions
Exam 12: Distributed Database Management Systems70 Questions
Exam 13: Business Intelligence and Data Warehouses100 Questions
Exam 14: Database Connectivity and Web Technologies100 Questions
Exam 15: Database Administration and Security100 Questions
Select questions type
The selection of the DBMS ____________________ involves asking the question,"Are the company's needs better served by a relational,object-oriented,or object/relational DBMS?"
(Short Answer)
4.9/5
(40)
Some common physical security practices found in large database installations include secured entrances,password-protected workstations,____,closed-circuit video,and voice-recognition technology.
(Multiple Choice)
4.9/5
(33)
The general coordinator of all DBAs is sometimes known as the ____________________ administrator.
(Short Answer)
4.7/5
(32)
A(n)____ plan is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.
(Multiple Choice)
4.8/5
(32)
System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
(True/False)
4.8/5
(34)
An access ____________________ describes the type of authorized access.
(Short Answer)
4.7/5
(34)
At the level of middle management,the database must be able to ____.
(Multiple Choice)
4.9/5
(32)
The testing and evaluation of a database application cover all aspects of the system-from the simple collection and creation of data to its use and retirement.What is covered by the evaluation process?
(Essay)
4.9/5
(38)
Protecting the data in the database is a function of authorization management.
(True/False)
4.8/5
(37)
An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.
(True/False)
4.9/5
(32)
In the IBM DB2 system catalog tables,____________________ stores one row for each column of each table or view.
(Short Answer)
4.9/5
(31)
It is common practice to define the DBA function by dividing the DBA operations according to the ____ phases.
(Multiple Choice)
4.8/5
(35)
Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.
(True/False)
4.8/5
(42)
A ____ is a uniquely identifiable object that allows a given person to log on to the database.
(Multiple Choice)
4.8/5
(36)
____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
(Multiple Choice)
4.9/5
(31)
____ are general statements of direction or action that communicate and support DBA goals.
(Multiple Choice)
4.8/5
(33)
The ____ administrator is responsible for strategic planning.
(Multiple Choice)
4.7/5
(39)
The ____________________,also known as the information resource manager (IRM),usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA,although the two roles overlap some.
(Short Answer)
4.7/5
(37)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)