Chapter 8 (Final) Flashcards
A tablespace is a named set of disk storage elements in which physical files for the database tables may be stored.
True
With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.
True
A view can be built to present only the data to which a user requires access.
True
Sarbanes-Oxley Act was enacted to ensure the integrity of:
public companies’ financial statements.
Database applications are not very disk intensive.
False
All of the following are advantages to cloud-based computing EXCEPT:
ACID support for database as a service.
A device to measure or detect fingerprints or signatures is called a(n) ________ device.
biometric
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
True
All of the following are characteristics of cloud technologies EXCEPT:
unlimited bandwidth.
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space.
data integrity
With ________, the database itself is lost, destroyed, or cannot be read.
database destruction
There are two principal types of authorization tables: one for subjects and one for facts.
False
Security is one advantage of partitioning.
True
Sensitivity testing involves:
checking to see if missing data will greatly impact results.
The restoration manager allows the DBMS to restore the database to a correct condition and restart processing transactions.
False