Chapter 16 Flashcards

1
Q

The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A full backup, or database dump, produces a complete copy of the entire database.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The storage locations for multiple backups must include sites inside and outside the organization.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The end user’s role requires a broad understanding of DBMS functions, configuration, programming languages, data modeling and design methodologies, and so on.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The end user must provide testing and evaluation services for all the database and DBA applications.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Training people to use the DBMS and its tools is not included in the DBA’s technical activities.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The DBA must define data views to protect and control the scope of the data that are accessible to an authorized user.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A DBMS facilitates ____.

A

-interpretation and presentation of data in useful formats

destruction of data and information to the right people at the right time

data presentation and data usage monitoring for adequate periods of time

automatic auditing of all data changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

At the level of middle management, the database must be able to ____.

A

represent and support the company operations as closely as possible

-deliver the data necessary for tactical decisions and planning

produce query results within specified performance levels

provide access to external and internal data to identify growth opportunities and to chart the direction of such growth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The person responsible for the control of the centralized and shared database is the database ____.

A

analyst

-administrator

programmer

user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is common practice to define the DBA function by dividing the DBA operations according to the ____ phases.

A

SLA

-DBLC

SDLC

MRA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

There is a growing trend toward ____ in the data-management function.

A

cross-training

encapsulation

-specialization

centralization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The DBA’s ____ role is focused on personnel management and on interactions with the end-user community.

A

administrative

arbitration

technical

-managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

As a manager, the DBA must concentrate on the ____ dimensions of the database administration function.

A

-control and planning

conflict and problem-resolution

policies and standards

security and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The DBA’s ____ role covers activities involving the use of the DBMS.

A

administrative

arbitration

-technical

managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.

A

Guidelines

-Standards

Procedures

Documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

____ are written instructions that describe a series of steps to be followed during the performance of a given activity.

A

Policies

Standards

Documentation

-Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

“All users must have passwords” is an example of a ____.

A

rule

-policy

standard

procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The ____ is responsible for ensuring database security and integrity.

A

database programmer

systems analyst

data administrator

-database security officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Procedures and standards must be revised at least ____ to keep them up-to-date.

A

weekly

monthly

every six months

-annually

21
Q

Current data distribution philosophy makes it easy for ____ end users to access the database.

A

limited

unauthorized

-authorized

any

22
Q

____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.

A

Backup and recovery

-System support

Performance monitoring and tuning

Security auditing and monitoring

23
Q

____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

A

Integrity

Compliance

Availability

-Confidentiality

24
Q

____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

A

Dangerous

Preserving

-Corrupting

Authorized

25
Q

Some common physical security practices found in large database installations include secured entrances, password-protected workstations, ____, closed-circuit video, and voice-recognition technology.

A

drug testing

fingerprinting

-electronic personnel badges

retina scans

26
Q

User-access management is a subset of ____.

A

password protection

-authorization management

data integrity

managerial control

27
Q

Classifying users into ____ according to common access needs facilitates the DBA’s job of controlling and managing the access privileges of individual users.

A

-user groups

sections

authorization schemes

policy definitions

28
Q

A(n) ____ data dictionary is automatically updated by the DBMS with every database access.

A

dynamic

-active

passive

static

29
Q

A(n) ____ data dictionary is not updated automatically and usually requires a batch process to be run.

A

active

-passive

static

dynamic

30
Q

____ CASE tools provide support for the planning, analysis, and design phases.

A

-Front-end

Back-end

Vertical

Horizontal

31
Q

The ____ component of a CASE tool produces the information system’s input/output formats.

A

analysis

graphics

program document generator

-screen painter and report generator

32
Q

Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.

A

false

33
Q

The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.

A

true

34
Q

The end user’s role requires a broad understanding of DBMS functions, configuration, programming languages, data modeling and design methodologies, and so on.

A

false

35
Q

The DBA works with managers to ensure the quality and integrity of database design and transactions.

A

false

36
Q

The end user must provide testing and evaluation services for all the database and DBA applications.

A

false

37
Q

Protecting the data in the database is a function of authorization management.

A

true

38
Q

The DBA must define data views to protect and control the scope of the data that are accessible to an authorized user.

A

true

39
Q

The ____ administrator is responsible for strategic planning.

A

system

-data

database

program

40
Q

____ are general statements of direction or action that communicate and support DBA goals.

A

Standards

-Policies

Documentation

Procedures

41
Q

____ are written instructions that describe a series of steps to be followed during the performance of a given activity.

A

Policies

Standards

Documentation

-Procedures

42
Q

A(n) ____ plan is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.

A

-access

completion

application

communications

43
Q

____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

A

Integrity

Compliance

Availability

-Confidentiality

44
Q

____ management is designed to limit access to the database.

A

Authorization

-User access

View

DBMS utility

45
Q

Several DBMS packages contain features that allow the creation of a(n) ____, which automatically records a brief description of the database operations performed by all users.

A

change tracker

digital footprint

paper trail

-audit log

46
Q

A(n) ____ data dictionary is not updated automatically and usually requires a batch process to be run.

A

active

-passive

static

dynamic

47
Q

____ CASE tools provide support for the coding and implementation phases.

A

Front-end

-Back-end

Vertical

Horizontal

48
Q

____ allows for the translation of the company’s strategic goals into the data and applications that will help the company achieve those goals.

A

Access Management

Business Intelligence

-Information engineering (IE)

MOLAP