Chapter 8 (Final) Flashcards

1
Q

A tablespace is a named set of disk storage elements in which physical files for the database tables may be stored.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A view can be built to present only the data to which a user requires access.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sarbanes-Oxley Act was enacted to ensure the integrity of:

A

public companies’ financial statements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Database applications are not very disk intensive.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All of the following are advantages to cloud-based computing EXCEPT:

A

ACID support for database as a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A device to measure or detect fingerprints or signatures is called a(n) ________ device.

A

biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All of the following are characteristics of cloud technologies EXCEPT:

A

unlimited bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space.

A

data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

With ________, the database itself is lost, destroyed, or cannot be read.

A

database destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

There are two principal types of authorization tables: one for subjects and one for facts.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security is one advantage of partitioning.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sensitivity testing involves:

A

checking to see if missing data will greatly impact results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The restoration manager allows the DBMS to restore the database to a correct condition and restart processing transactions.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Clustering allows for adjacent secondary memory locations to contain rows from several tables.

A

True

17
Q

While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the:

A

operating system.

18
Q

Vertical partitioning means distributing the columns of a table into several separate physical tables.

A

True

19
Q

A key decision in the physical design process is:

A

selecting structures.

20
Q

A(n) ________ is a routine that converts a primary key value into a record address.

A

hashing algorithm

21
Q

The smallest unit of named application data is a record.

A

False

22
Q

Guidelines for server security should include all of the following EXCEPT:

A

securing the network between client and server.

23
Q

Broad network access is a characteristic of cloud computing.

A

True

24
Q

An audit trail of database changes is kept by a:

A

journalizing facility.

25
Q

Hash partitioning spreads data evenly across partitions independent of any partition key value.

A

True