3D051 Vol. 2 Flashcards
(201) In the context of cognitive hierarchy what information is analyzed to provide meaning and
value, or evaluated as to implications for the operation?
a. Data.
b. Information.
c. Knowledge.
d. Understanding.
c. Knowledge.
(201) In the context of cognitive hierarchy, what is knowledge that has been synthesized and
judgment applied to it in a specific situation to comprehend the situation’s inner relationships?
a. Data.
b. Information.
c. Knowledge.
d. Understanding.
d. Understanding.
(201) Data analyzed describes what level of the cognitive hierarchy?
a. Data.
b. Information.
c. Knowledge.
d. Understanding.
b. Information.
(201) Knowledge combined with judgment and experience describes what level of the cognitive hierarchy? a. Data. b. Information. c. Knowledge. d. Understanding.
d. Understanding.
(202) What objectives will the maturation of the services oriented architecture directly support?
a. Department of Defense.
b. Secretary of the Air Force.
c. MAJCOM commander.
d. Wing commander.
b. Secretary of the Air Force.
(203) What is a data element?
a. Personal record of a structure type.
b. Physical representation of data entity attribute.
c. Data structure of how data resides in a database.
d. Specialized format for organizing and storing data.
b. Physical representation of data entity attribute.
(204) What term is a structured description of records used to describe database objects
representations, and the relationships among them?
a. Model.
b. Pointer.
c. Schema.
d. Structure.
c. Schema.
(204) When storing data structures a group of ordered data items or elements defines what type of list? a. Stack. b. Linked. c. Sequential. d. Hierarchical.
b. Linked.
(204) What term do you used to address the data item instead of addressing the entire size of the data item? a. Model. b. Pointer. c. Schema. d. Structure.
b. Pointer.
(204) What term describes a set of data elements or values organized by using a model of horizontal rows and vertical columns? a. View. b. Build. c. Meta-data. d. Database table.
d. Database table.
(204) A tree structure within a hierarchical data structure is best used to display database records that have what type of fields? a. Reliant. b. Repeated. c. Structured. d. Independent.
b. Repeated.
(204) Another data structure name for a network that is similar to a tree structure is called a
a. plex.
b. view.
c. model.
d. schema.
a. plex.
(205) Who must test and certify user-developed software before installing it on an automated information system? a. Database administrator. b. Local security officials. c. Base IAA security officials. d. Functional database administrator.
b. Local security officials.
(205) One method to provide protection of critical data against tampering is to control the
physical access to the automated information system itself by
a. managing data activities.
b. installing keyboard locks.
c. performing periodical audits.
d. using the least privilege concept.
b. installing keyboard locks.
(205) One method a database administrator can maintain database access control is to limit a user access to a. manage data activities. b. install keyboard locks. c. perform periodical audits. d. use the least privilege concept
d. use the least privilege concept
(206) The main purpose of a database is to
a. process organized data into tables.
b. represent data in a quantifiable manner.
c. make data independent of its programs.
d. identifying data and the corresponding relationships.
c. make data independent of its programs.
(206) What term best describes the process of organizing data into tables that result in the database being unambiguous as intended? a. Normalization. b. Semantic modeling. c. Data denormalization. d. Entity-Relationship modeling.
a. Normalization.
(206) What database normalization form has a type of entity dependency called transitive dependency? a. First. b. Second. c. Third. d. Fourth.
c. Third.
(206) What term best describes the redundant storing of the customer name in the purchase order entity? a. Normalization. b. Semantic modeling. c. Data denormalization. d. Entity-Relationship diagram.
c. Data denormalization.
(207) What method is used by a database administrator to manage the updating of information on an enterprise’s computer system?
a. data activity.
b. data repository.
c. configuration control.
d. system documentation.
c. configuration control.
(207) The database maintenance responsibility that addresses disk fragmentation is
a. the DBMS.
b. data activity.
c. a data repository.
d. the database structure.
a. the DBMS.
(207) What causes database fragmentation?
a. Gaps left in the database due to record deletions.
b. Database becoming logically unorganized.
c. Unstructured record formats.
d. Data denormalization.
a. Gaps left in the database due to record deletions.