V2 Unit 1-Data Management Flashcards

0
Q

What must you do to data for it to become meaningful to the end user?

A

process and organize it prior to sending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the four classes of information in a cognitive hierarchy?

A
  1. Data
  2. Information
  3. Knowledge
  4. Understanding
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how is metadata used?

A

to describe how data is structured by using a subscribed syntax and to associate data with semantics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is cognition?

A

the act of learning of integrating from various pieces of information (allows commanders and staff to generate knowledge)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the objective of transparency?

A

to ensure the process of transforming data into information used for decision making is traceable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

content, delivery services deliver information assets to end users. these services can be of two types, what are they?

A
  1. core data

2. aggregation services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does SOE (Services Oriented Enterprise) provide?

A

a meaning of achieving IT agility and flexibility to support rapidly evolving mission processes and changing goals and objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how are data elements obtained?

A

from data models and represent DOD info systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a standard?

A

something that is measurable and repeatable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is data structure?

A

a specialized format for organizing and storing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how are data structures organized?

A

designed to organize data to suit of specific programming purpose so you can access them later and use them in appropriate ways to produce a desired output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a schema?

A

a structured description of records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are physical data structures concerned with?

A

how data resides in a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

explain the difference between using linked and sequential lists.

A

Linked is a group of ordered items or lists while sequential(or ordered) is a list arranged in the order the items are read.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what do logical structures allow users to do?

A

view stored data in the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how do tables and views differ?

A

views are also relational data tables, the only difference though is their data is calculated at query time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the definition of parent node?

A

the node above all other nodes besides the root node

17
Q

define the child node?

A

located under all other nodes at the bottom end of a node branch.

18
Q

define the root node.

A

the node at the top of the hierarchical tree.

19
Q

what is special about having a network data structure?

A

the relationship from parent-child node and child-parent node can be one to many.

20
Q

what must you ensure before installing any software product on an operational Air Force computer?

A

appropriate actions have to been taken to ensure the security of the system cannot be degraded by the addition of the new software.

21
Q

what security features should security software implement?

A

should detect and respond to unauthorized attempts to change, circumvent, or otherwise violate security features.

22
Q

what restrictions apply to maintenance activities?

A

authorize software only to authorized maintenance personnel with appropriate security clearance

23
Q

why should you perform a security audit trail?

A

to determine if your security features on your database system are working

24
Q

what events are auditable?

A
  1. use of id and authentication
  2. user actions to create, modify, or delete programs/files
  3. actions taken by cpu operators, system admins, and system security admins
  4. any event that attempts to change the security profile of the system
  5. any event that attempts to violate the security policy of the system
25
Q

what information should be recorded during the audit?

A
  1. type of event
  2. date and time of event
  3. unique identifier of the user or device generating the event
  4. success or failure of the event
  5. origin of the request for id and authentication events
  6. name of program/file introduced, accessed, or deleted
26
Q

how can you protect critical data agains tampering?

A

control physical access of the AIS itself by installing keyboard locks or other security mechanisms on the cpu

27
Q

what access controls can you apply to a database?

A

access to files, segments, software, and devices so only authorized users, based on need-to-know, can use the system and data resources

28
Q

what is the main purpose of a database?

A

make data independent of the programs that use it

29
Q

define normalization

A

process of organizing data into tables in such a way that the results of using the database are unambiguous as intended

30
Q

describe the first normal form

A

an entity is in the first normal form if each attribute of the entity occurs only once or twice and there are no repeating groups of data

31
Q

describe the second normal form

A

an entity is in the second normal form if its in first normal form and each attribute is dependent on its entire primary key.

32
Q

describe third normal form

A

an entity is in third normal form if its in second normal form and no attribute of the entity is dependent on another non-key attribute

33
Q

what is data denormalization?

A

the process of deliberately violating data normalization techniques

34
Q

who is responsible for the technical implementation and maintenance of the database?

A

the database administrator

35
Q

what permission can the dba grant?

A

access, insert, delete, or modify existing data

36
Q

name four functions a dba performs.

A
  1. managing database structure
  2. managing data activity
  3. managing the DBMS
  4. maintaining the data repository
37
Q

what is the DBA’s final responsibility when managing database structure?

A

updating the system documentation

38
Q

what are the symptoms of data base fragmentation?

A

when unused gaps begin forming in between the remaining records

39
Q

list the three steps of reorganization

A
  1. all the records must be removed from the database. when the records are unloaded, the file containing them is stored on a disk or other media.
  2. the old database must be initialized. remove all pointers and reinitializing the partitioned database
  3. reload the database from the file created in step one.
40
Q

in an effort to combat situations we have little control over, what should a dba be considering?

A

using an uninterruptible power supply (UPS) for the server or mainframe that is running the database

41
Q

to minimize database destruction, how often should the database be backed up?

A

never let more than two updates pass without backing up the database.