Ch20 Flashcards

1
Q

what are the three elements of the DevOps model

A

DEVelopment
Operations
QA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

used to enforce referential integrity constraints between tables that participate in a relationship

A

Foreign keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

allows the insertion of multiple records that appear to have the same primary key values into a database at different classification levels

A

Polyinstantiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what level of the the SW‐CMM does the organization uses quantitative measures to gain a detailed understanding of the development process

A

level 4 - Managed phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

mixing of data from a higher classification level and/or need‐to‐know requirement with data from a lower classification level and/or need‐to‐know requirement.

A

Contamination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

flat two-dimensional tables made up of rows and columns.

A

relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the main building block of the relational database

A

table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is another name for a table

A

relation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

combine relational databases with the power of objectoriented programming

A

Object-relational databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

benefit from ease of code reuse, ease of troubleshooting analysis, and reduced overall maintenance. also better suited than other types of databases for supporting complex applications involving multimedia, CAD, video, graphics, and expert systems.

A

object-oriented databases (OODBs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

another name for a column or field is

A

attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is it common for the degree of a table to change

A

no - but it is for the Cardinality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who usually is required to change the degree of a table

A

Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a subset of attributes that can be used to uniquely identify any record in a table

A

candidate key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

selected from the set of candidate keys for a table to be used to uniquely identify the records in a table

A

primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

process of bringing a database table into compliance with normal forms is known as

A

normalization

17
Q

normal forms are cumulative; in other words, to be in 2NF, a table must first be 1NF compliant. Before making a table 3NF compliant, it must first be in 2NF.

18
Q

SQL itself is divided into two distinct components what are they

A

Data Definition Language (DDL)

Data Manipulation Language (DML)

19
Q

SQL component that allows for the creation and modification of the database’s structure known as schema

A

Data Definition Language (DDL)

20
Q

SQL component that allows users to interact with the data contained within that schema.

A

Data Manipulation Language (DML)

21
Q

Relational databases support the explicit and implicit use of transactions to ensure data integrity. Each transaction is a discrete set of SQL instructions that will either succeed or fail as a group. It’s not possible for one part of a transaction to succeed while another part
fails.

22
Q

Database transactions must be an “all-or nothing” affair.

23
Q

what is it called when database transactions are committed to the database and then preserved

A

Durability

24
Q

a preventive security mechanism that endeavors to make certain that the information stored in the database is always correct or at least has its integrity and availability protected.

A

concurrency or edit control

25
Q

ensures that user actions don’t violate any structural rules.
It also checks that all stored data types are within valid domain ranges, ensures that only logical values exist, and confirms that the system complies with any and all uniqueness constraints.

A

Semantic integrity

26
Q

concept of hiding individual database fields or cells or imposing more security restrictions on them.

A

cell suppression

27
Q

Administrators might employ _____ _______ to subvert aggregation and inference vulnerabilities

A

database partitioning

28
Q

when two or more rows in the same relational database table
appear to have identical primary key elements but contain different data for use at differing classification levels. used as defense against inference attacks

A

polyinstantiation

29
Q

what is it called when administrators can insert false or misleading data into a DBMS in order to redirect or thwart information confdentiality attacks

A

noise and perturbation

30
Q

database feature that allows applications to communicate with different types of databases without having to be directly programmed for interaction with each type

A

Open Database Connectivity (ODBC)

31
Q

Expert systems consist of two main components

A
  • knowledge base - contains a series of “if/then” rules

- inference engine - that uses that information to draw conclusions about other data

32
Q

sequential development process that results in the development of a finished product; Developers may step back only one phase in the process if errors are discovered

A

waterfall model

33
Q

uses several iterations of the waterfall model to produce a number of fully specified and tested prototypes.

A

spiral model

34
Q

place an emphasis on the needs of the customer and quickly developing new functionality that meets those needs in an iterative fashion.

A

Agile model

35
Q

the quality of software depends on the quality of its development process.

A

SW-CMM Software Capability Maturity Model

36
Q

what are the stages of SW-CMM

A

Initial - little or no software development process

Repeatable - basic life cycle management, Reuse code and repeatable results

Defined - formal, documented software development processes. All development projects take place within
the constraints of the new standardized management model.

Managed - management of the software process proceeds to the next level. Quantitative measures are utilized to gain a detailed understanding of the development process.

Optimizing - process of continuous improvement
occurs. Sophisticated software development processes are in place

37
Q

what are the stages of the IDEAL model

A

Initiating - business reasons outlined, support for the initiative, and the appropriate infrastructure

Diagnosing - engineers analyze the current state of the
organization and make general recommendations for change

Establishing - takes the general recommendations from the diagnosing phase and develops a specific plan of action

Acting - walk the walk.” The organization develops solutions and then tests, refines, and implements them.

Learning - continuously analyze its efforts to determine whether it has achieved the desired goals and, when
necessary, propose new actions

38
Q

what are the 3 basic components of change control

A

request control - organized framework within which users can request modifcations, managers can conduct cost/beneft analysis, and developers can prioritize tasks.

change control - developers can create and test a solution; quality control; develop tools; documentation

release control - changes are finalized & approved for release; double-check debugging code and/or back doors are removed; acceptance testing