Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Humanities
Q:
Testing procedures and standards must already be in place before any application program can be approved for use in the company.
Q:
The end user must provide testing and evaluation services for all the database and DBA applications.
Q:
The DBA works with managers to ensure the quality and integrity of database design and transactions.
Q:
The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department.
Q:
The DBA must supervise the installation of all software and hardware designated to support the data administration strategy, must have a thorough understanding of the components being installed, and must be familiar with the installation, configuration, and startup procedures of such components.
Q:
The end user's role requires a broad understanding of DBMS functions, configuration, programming languages, data modeling and design methodologies, and so on.
Q:
The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.
Q:
The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
Q:
Physical protection of hardware and software must be accomplished by the use of open installations with restricted area access.
Q:
The storage locations for multiple backups must include sites inside and outside the organization.
Q:
Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database.
Q:
Concurrent backups take place while the user is working on the database.
Q:
Incremental backups produce a backup of all data.
Q:
A full backup, or database dump, produces a complete copy of the entire database.
Q:
Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.
Q:
The security, privacy, and integrity of the data in the database are of minimal concern to DBAs who manage current DBMS installations.
Q:
The DBA interacts with the end user by providing data and information support services to the organization's departments.
Q:
The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization.
Q:
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
Q:
An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.
Q:
The DBMS must provide tools that give each level of management a different view of the data and support the required level of decision-making.
Q:
The testing and evaluation of a database application cover all aspects of the systemfrom the simple collection and creation of data to its use and retirement. What is covered by the evaluation process?
Q:
Describe the need for convenient and safe backup storage.
Q:
Explain conflict and problem resolution as part of the DBA's end-user support services.
Q:
Explain user requirements gathering as part of the DBA's end-user support services.
Q:
Describe the DBA's managerial role.
Q:
A(n) ____________________physically stores the database's data.
Q:
By default, Oracle automatically creates ____________________ and SYS user IDs that have administrative privileges with every new database you create.
Q:
A(n) ________________________________________ provides a framework that includes the use of computerized, automated, and integrated tools such as a DBMS and CASE tools.
Q:
One CASE tool, ____________________ Data Modeler by Computer Associates, produces fully documented ER diagrams that can be displayed at different abstraction levels.
Q:
In the IBM DB2 system catalog tables, ____________________ stores one row for each column of each table or view.
Q:
An access ____________________ describes the type of authorized access.
Q:
A security ____________________is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
Q:
____________________ focuses on maintaining the data free of inconsistencies and anomalies.
Q:
The DBA must periodically generate a(n) ____________________ report to determine whether there have been actual or attempted security violationsand, if so, from what locations, and if possible, by whom.
Q:
Performance monitoring and ____________________ require much of the DBA's attention and time. These activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels.
Q:
The DBA must review the database application design to ensure that transactions are ____________________, meaning that they do not overload the DBMS.
Q:
The selection of the DBMS ____________________ involves asking the question, "Are the company's needs better served by a relational, object-oriented, or object/relational DBMS?"
Q:
The most common backup medium has traditionally been ____________________.
Q:
In large organizations, the DSO's activities are often classified as ____________________ management.
Q:
In today's Internet environment, the DBA must also work with ____________________ and network administrators to implement efficient and secure Web-to-database connectivity.
Q:
The requirement that a password must have a maximum of 12 characters is an example of a(n) ____________________.
Q:
The DBA's function includes educating the ____________________ in the services provided and how those services enhance data stewardship and data security.
Q:
The ____________________, also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles overlap some.
Q:
The general coordinator of all DBAs is sometimes known as the ____________________ administrator.
Q:
Placing the DBA function in a(n) ____________________ position often creates a consulting environment in which the DBA is able to devise the data administration strategy but does not have the authority to enforce it or to resolve possible conflicts.
Q:
The advent of the DBMS and its shared view of data produced a new level of data management sophistication and led the DP department to evolve into a(n) _________________________ department.
Q:
Most of today's successful organizations depend on the ____________________ database to provide support for all of their operationsfrom design to implementation, from sales to services, and from daily decision making to strategic planning.
Q:
____________________deals with the rights of individuals and the organization to determine the "who, what, when, where, and how" of data usage.
Q:
____________________ decisions are short term and affect only daily operations; for example, deciding to change the price of a product to clear it from inventory.
Q:
An organization is subject to a(n) _________________________ cycle; that is, the data user applies intelligence to data to produce information that is the basis of knowledge used in decision making by the user.
Q:
One of the important functions provided by the database ____ is to reserve the resources that must be used by the database at run time.a. security component b. authorization manager c. initialization parametersd. administrator
Q:
A ____ is a named collection of settings that control how much of the database resource a given user can use.a. user b. role c. profiled. manager
Q:
A ____ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.a. user b. role c. profiled. manager
Q:
A ____ is a uniquely identifiable object that allows a given person to log on to the database.a. user b. role c. profiled. manager
Q:
In the Oracle Enterprise Manager, a ____ is basically any object created by end users; for example, tables, views, indexes, stored procedures, and triggers.a. component b. database object c. policyd. role
Q:
A(n) ____ is a logical storage space in Oracle.a. audit log b. datafile c. schemad. tablespace
Q:
A(n) ____ serves as the basis for planning, development, and control of future information systems
a. access plan
b. active data dictionary
c. information systems architecture (ISA)
d. security policy
Q:
____ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.a. Access Management b. Business Intelligence c. Information engineering (IE)d. MOLAP
Q:
The ____ component of a CASE tool produces the information system's input/output formats.a. analysis b. graphics c. program document generatord. screen painter and report generator
Q:
____ CASE tools provide support for the coding and implementation phases.a. Front-end b. Back-end c. Verticald. Horizontal
Q:
____ CASE tools provide support for the planning, analysis, and design phases.a. Front-end b. Back-end c. Verticald. Horizontal
Q:
A(n) ____ data dictionary is not updated automatically and usually requires a batch process to be run.a. active b. passive c. staticd. dynamic
Q:
A(n) ____ data dictionary is automatically updated by the DBMS with every database access.a. dynamic b. active c. passived. static
Q:
Several DBMS packages contain features that allow the creation of a(n) ____, which automatically records a brief description of the database operations performed by all users.a. change tracker b. digital footprint c. paper traild. audit log
Q:
Classifying users into ____ according to common access needs facilitates the DBA's job of controlling and managing the access privileges of individual users.a. user groups b. sections c. authorization schemesd. policy definitions
Q:
User-access management is a subset of ____.a. password protection b. authorization management c. data integrityd. managerial control
Q:
Some common physical security practices found in large database installations include secured entrances, password-protected workstations, ____, closed-circuit video, and voice-recognition technology.a. drug testing b. fingerprinting c. electronic personnel badgesd. retina scans
Q:
____ management is designed to limit access to the database.a. Authorization b. User access c. Viewd. DBMS utility
Q:
____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.a. Dangerous b. Preserving c. Corruptingd. Authorized
Q:
____deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.a. Integrity b. Compliance c. Availabilityd. Confidentiality
Q:
____activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.a. Backup and recovery b. System support c. Performance monitoring and tuningd. Security auditing and monitoring
Q:
A(n) ____ planis a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.a. access b. completion c. applicationd. communications
Q:
Current data distribution philosophy makes it easy for ____end users to access the database.a. limited b. unauthorized c. authorizedd. any
Q:
Procedures and standards must be revised at least ____ to keep them up-to-date.a. weekly b. monthly c. every six monthsd. annually
Q:
The ____ is responsible for ensuring database security and integrity.a. database programmer b. systems analyst c. data administratord. database security officer
Q:
Instructions to create a password are an example of a ____.a. rule b. policy c. standardd. procedure
Q:
"All users must have passwords" is an example of a ____.a. rule b. policy c. standardd. procedure
Q:
____ are written instructions that describe a series of steps to be followed during the performance of a given activity.a. Policies b. Standards c. Documentationd. Procedures
Q:
____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.a. Guidelines b. Standards c. Proceduresd. Documentation