Chapter 16 Flashcards
The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization.
True
A full backup, or database dump, produces a complete copy of the entire database.
True
The storage locations for multiple backups must include sites inside and outside the organization.
True
The end user’s role requires a broad understanding of DBMS functions, configuration, programming languages, data modeling and design methodologies, and so on.
False
The end user must provide testing and evaluation services for all the database and DBA applications.
False
Training people to use the DBMS and its tools is not included in the DBA’s technical activities.
False
The DBA must define data views to protect and control the scope of the data that are accessible to an authorized user.
True
A DBMS facilitates ____.
-interpretation and presentation of data in useful formats
destruction of data and information to the right people at the right time
data presentation and data usage monitoring for adequate periods of time
automatic auditing of all data changes
At the level of middle management, the database must be able to ____.
represent and support the company operations as closely as possible
-deliver the data necessary for tactical decisions and planning
produce query results within specified performance levels
provide access to external and internal data to identify growth opportunities and to chart the direction of such growth
The person responsible for the control of the centralized and shared database is the database ____.
analyst
-administrator
programmer
user
It is common practice to define the DBA function by dividing the DBA operations according to the ____ phases.
SLA
-DBLC
SDLC
MRA
There is a growing trend toward ____ in the data-management function.
cross-training
encapsulation
-specialization
centralization
The DBA’s ____ role is focused on personnel management and on interactions with the end-user community.
administrative
arbitration
technical
-managerial
As a manager, the DBA must concentrate on the ____ dimensions of the database administration function.
-control and planning
conflict and problem-resolution
policies and standards
security and privacy
The DBA’s ____ role covers activities involving the use of the DBMS.
administrative
arbitration
-technical
managerial
____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.
Guidelines
-Standards
Procedures
Documentation
____ are written instructions that describe a series of steps to be followed during the performance of a given activity.
Policies
Standards
Documentation
-Procedures
“All users must have passwords” is an example of a ____.
rule
-policy
standard
procedure
The ____ is responsible for ensuring database security and integrity.
database programmer
systems analyst
data administrator
-database security officer
Procedures and standards must be revised at least ____ to keep them up-to-date.
weekly
monthly
every six months
-annually
Current data distribution philosophy makes it easy for ____ end users to access the database.
limited
unauthorized
-authorized
any
____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.
Backup and recovery
-System support
Performance monitoring and tuning
Security auditing and monitoring
____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.
Integrity
Compliance
Availability
-Confidentiality
____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
Dangerous
Preserving
-Corrupting
Authorized
Some common physical security practices found in large database installations include secured entrances, password-protected workstations, ____, closed-circuit video, and voice-recognition technology.
drug testing
fingerprinting
-electronic personnel badges
retina scans
User-access management is a subset of ____.
password protection
-authorization management
data integrity
managerial control
Classifying users into ____ according to common access needs facilitates the DBA’s job of controlling and managing the access privileges of individual users.
-user groups
sections
authorization schemes
policy definitions
A(n) ____ data dictionary is automatically updated by the DBMS with every database access.
dynamic
-active
passive
static
A(n) ____ data dictionary is not updated automatically and usually requires a batch process to be run.
active
-passive
static
dynamic
____ CASE tools provide support for the planning, analysis, and design phases.
-Front-end
Back-end
Vertical
Horizontal
The ____ component of a CASE tool produces the information system’s input/output formats.
analysis
graphics
program document generator
-screen painter and report generator
Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.
false
The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.
true
The end user’s role requires a broad understanding of DBMS functions, configuration, programming languages, data modeling and design methodologies, and so on.
false
The DBA works with managers to ensure the quality and integrity of database design and transactions.
false
The end user must provide testing and evaluation services for all the database and DBA applications.
false
Protecting the data in the database is a function of authorization management.
true
The DBA must define data views to protect and control the scope of the data that are accessible to an authorized user.
true
The ____ administrator is responsible for strategic planning.
system
-data
database
program
____ are general statements of direction or action that communicate and support DBA goals.
Standards
-Policies
Documentation
Procedures
____ are written instructions that describe a series of steps to be followed during the performance of a given activity.
Policies
Standards
Documentation
-Procedures
A(n) ____ plan is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.
-access
completion
application
communications
____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.
Integrity
Compliance
Availability
-Confidentiality
____ management is designed to limit access to the database.
Authorization
-User access
View
DBMS utility
Several DBMS packages contain features that allow the creation of a(n) ____, which automatically records a brief description of the database operations performed by all users.
change tracker
digital footprint
paper trail
-audit log
A(n) ____ data dictionary is not updated automatically and usually requires a batch process to be run.
active
-passive
static
dynamic
____ CASE tools provide support for the coding and implementation phases.
Front-end
-Back-end
Vertical
Horizontal
____ allows for the translation of the company’s strategic goals into the data and applications that will help the company achieve those goals.
Access Management
Business Intelligence
-Information engineering (IE)
MOLAP