Exam 11: Data and Database Administration
Exam 1: The Database Environment and Development Process173 Questions
Exam 2: Modeling Data in the Organization121 Questions
Exam 3: The Enhanced E-R Model and Business Rules74 Questions
Exam 4: Logical Database Design and the Relational Model120 Questions
Exam 5: Physical Database Design and Performance105 Questions
Exam 6: Introduction to SQL119 Questions
Exam 7: Advanced SQL111 Questions
Exam 8: Database Application Development100 Questions
Exam 9: Data Warehousing117 Questions
Exam 10: Data Quality and Integration102 Questions
Exam 11: Data and Database Administration116 Questions
Exam 12: Distributed Databases109 Questions
Exam 13: Object-Oriented Data Modeling91 Questions
Exam 14: Using Relational Databases to Provide Object Persistence113 Questions
Select questions type
Which of the following is NOT an area of concern when trying to maintain a well-tuned database?
Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
D
With a one-key encryption standard,both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
Guidelines for server security should include all of the following EXCEPT:
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
A
A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes.
(True/False)
4.7/5
(33)
The process of managing simultaneous operations against a database so that data integrity is maintained is called ________.
(Short Answer)
4.8/5
(43)
In order to perform a restore/rerun,the database must be mirrored.
(True/False)
4.7/5
(39)
A(n)________ is a facility by which the DBMS refuses to accept any new transactions.
(Short Answer)
4.9/5
(38)
A discrete unit of work that must be processed completely or not at all in a computer system is called a(n)________.
(Short Answer)
4.8/5
(32)
________ makes it easier to integrate a new software tool into a development process.
(Short Answer)
4.7/5
(34)
There are two principal types of authorization tables: one for subjects and one for facts.
(True/False)
4.8/5
(27)
A repository of information about a database that documents data elements of a database is called a:
(Multiple Choice)
4.9/5
(38)
The transaction log contains before- and after-images of records that have been modified.
(True/False)
4.8/5
(36)
Specifications for transactions do not need to be reviewed quickly.
(True/False)
4.9/5
(26)
A high-level function that is responsible for the overall management of data resources in an organization is called ________.
(Short Answer)
4.8/5
(44)
CASE tool-generated information should be fed into repositories.
(True/False)
4.8/5
(26)
A(n)________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.
(Multiple Choice)
4.7/5
(35)
Showing 1 - 20 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)