Chapter 8 (Final) Flashcards
A tablespace is a named set of disk storage elements in which physical files for the database tables may be stored.
True
With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.
True
A view can be built to present only the data to which a user requires access.
True
Sarbanes-Oxley Act was enacted to ensure the integrity of:
public companies’ financial statements.
Database applications are not very disk intensive.
False
All of the following are advantages to cloud-based computing EXCEPT:
ACID support for database as a service.
A device to measure or detect fingerprints or signatures is called a(n) ________ device.
biometric
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
True
All of the following are characteristics of cloud technologies EXCEPT:
unlimited bandwidth.
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space.
data integrity
With ________, the database itself is lost, destroyed, or cannot be read.
database destruction
There are two principal types of authorization tables: one for subjects and one for facts.
False
Security is one advantage of partitioning.
True
Sensitivity testing involves:
checking to see if missing data will greatly impact results.
The restoration manager allows the DBMS to restore the database to a correct condition and restart processing transactions.
False
Clustering allows for adjacent secondary memory locations to contain rows from several tables.
True
While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the:
operating system.
Vertical partitioning means distributing the columns of a table into several separate physical tables.
True
A key decision in the physical design process is:
selecting structures.
A(n) ________ is a routine that converts a primary key value into a record address.
hashing algorithm
The smallest unit of named application data is a record.
False
Guidelines for server security should include all of the following EXCEPT:
securing the network between client and server.
Broad network access is a characteristic of cloud computing.
True
An audit trail of database changes is kept by a:
journalizing facility.
Hash partitioning spreads data evenly across partitions independent of any partition key value.
True