Exam 11: Data and Database Administration
Exam 1: The Database Environment and Development Process173 Questions
Exam 2: Modeling Data in the Organization121 Questions
Exam 3: The Enhanced E-R Model and Business Rules74 Questions
Exam 4: Logical Database Design and the Relational Model120 Questions
Exam 5: Physical Database Design and Performance105 Questions
Exam 6: Introduction to SQL119 Questions
Exam 7: Advanced SQL111 Questions
Exam 8: Database Application Development100 Questions
Exam 9: Data Warehousing117 Questions
Exam 10: Data Quality and Integration102 Questions
Exam 11: Data and Database Administration116 Questions
Exam 12: Distributed Databases109 Questions
Exam 13: Object-Oriented Data Modeling91 Questions
Exam 14: Using Relational Databases to Provide Object Persistence113 Questions
Select questions type
Open-source DBMS are ________ software that provides the core functionality of an SQL compliant DBMS.
(Short Answer)
4.8/5
(33)
The data administrator takes responsibility for the overall management of data resources.
(True/False)
4.8/5
(38)
Which of the following skills are required of a database administrator?
(Multiple Choice)
4.9/5
(41)
A DBMS may perform checkpoints automatically or in response to commands in user application programs.
(True/False)
4.7/5
(39)
The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.
(True/False)
4.9/5
(37)
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store,process and output electronic data in a secure manner is called a(n):
(Multiple Choice)
4.7/5
(40)
A device to measure or detect fingerprints or signatures is called a(n)________ device.
(Multiple Choice)
4.7/5
(40)
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.
(True/False)
4.9/5
(30)
The ________ is a record of the essential data for each transaction that has been processed against the database.
(Short Answer)
4.9/5
(26)
Which of the following threats involves outside parties using information to embarrass a company?
(Multiple Choice)
4.8/5
(36)
While views promote security by restricting user access to data,they are not adequate security measures because:
(Multiple Choice)
4.9/5
(32)
Which of the following is not a component of a repository system architecture?
(Multiple Choice)
5.0/5
(36)
What new trends and technologies have driven the need for changes in the data administration and database administration roles?
(Essay)
4.8/5
(30)
A view can be built to present only the data to which a user requires access.
(True/False)
5.0/5
(31)
Controls incorporated into a data management system that restrict access to data are called ________.
(Short Answer)
4.8/5
(27)
Showing 41 - 60 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)