Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Management
Q:
Electronic payment can be easier to audit and monitor than payment made by check.
a. True
b. False
Q:
Electronic commerce reduces the speed and accuracy with which businesses can exchange information.
a. True
b. False
Q:
Electronic commerce provides buyers with an easy way to customize the level of detail in the information they obtain about a prospective purchase.
a. True
b. False
Q:
A product that has a strong brand reputation is easier to sell over the Web than an unbranded item.
a. True
b. False
Q:
A DVD is an excellent example of an item with a high value-to-weight ratio.
a. True
b. False
Q:
A product's shipping profile is a collection of details about the shipper.
a. True
b. False
Q:
A commodity item is a product or service that is hard to distinguish from the same product or service provided by other sellers.
a. True
b. False
Q:
Irrespective of the transferability of merchandising skills to the Web, products are difficult to sell on the Web.
a. True
b. False
Q:
In some cases, business processes use traditional commerce activities very effectively, and technology cannot improve them.
a. True
b. False
Q:
The increase in broadband connections in homes is a key element in the B2C component of the second wave.
a. True
b. False
Q:
Value-added networks are leased telephone lines that establish direct network connections to all trading partners of an organization.
a. True
b. False
Q:
Aproblem that EDI pioneers faced was the high cost of implementation.
a. True
b. False
Q:
The U.S. government is one of the largest electronic data interchange (EDI) trading partners in the world.
a. True
b. False
Q:
Business-to-business electronic commerce occurs when a person sells an item through a Web auction site to another person.
a. True
b. False
Q:
Transferring funds, placing orders, sending invoices, and shipping goods to customers are all types of activities or transactions.
a. True
b. False
Q:
All the activities associated with a transaction result in measurable and recordable transactions.
a. True
b. False
Q:
A transaction is an exchange of value, such as a purchase, a sale, or the conversion of raw materials into a finished product.
a. True
b. False
Q:
IBM defines electronic business as "the transformation of key business processes through the use of Internet technologies."
a. True
b. False
Q:
Performance monitoring and ___________activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels.
Q:
The DBA must review the database application design to ensure that transactions are_____________ , meaning that they mirror real-world events.
Q:
In the context of ensuring integrity of a database, a(n)____________ transaction is one that does not overload the DBMS.
Q:
The DSO's activities are often classified as__________ management, which includes all DBA activities designed to ensure data availability following a physical calamity or a database integrity failure.
Q:
The requirement that a password must have a maximum of 12 characters is an example of a(n)_______________ .
Q:
Based on the type of decision-making support required, database users may be classified into: operational, tactical, or _____.
Q:
The_______________ , also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap.
Q:
In case a company installs several incompatible databases and assigns a DBA for each of them, the general coordinator of all such DBAs is known as the___________ administrator.
Q:
In the context of the advancements in DBMS technology, the use of _________data services can free the DBA from many lower-level technology-oriented tasks.
Q:
The_______________ aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization.
Q:
In the context of database administration, _____________is the extent to which individuals and organizations have the right to determine the "who, what, when, where, and how" of data usage.
Q:
In the context of an organization's managerial structure, ____________decisions are short term and affect only daily operations; for example, deciding to change the price of a product to clear it from inventory.
Q:
In the context of data quality management tools, ________________software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.
Q:
One of the important functions provided by the database________________ is to reserve the resources that must be used by the database at run time.a. security componentb. authorization managerc. initialization parametersd. administrator
Q:
In the context of the Oracle Enterprise Manager, a ______________is a named collection of settings that control how much of the database resource a given user can use.a. licenseb. rolec. profiled. constraint
Q:
In the context of the Oracle Enterprise Manager, a(n)_____________ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.a. licenseb. rolec. profiled. quota
Q:
In the context of the Oracle Enterprise Manager, a(n)_____________ is a uniquely identifiable object that allows a given person to log on to the database.a. userb. rolec. profiled. client
Q:
A(n)_______________ is a logical storage area in Oracle.a. audit logb. datafilec. schemad. tablespace
Q:
In the context of developing a data administration strategy, a(n)____________ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools.a. access planb. active data dictionaryc. information systems architectured. security policy
Q:
_____________________allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.a. Access Managementb. Business Intelligencec. Information engineering (IE)d. MOLAP
Q:
The____________ component of a CASE tool produces the information system's input/output formats.a. analysisb. graphicsc. program document generatord. screen painter and report generator
Q:
_______________CASE tools provide support for the coding and implementation phases.a. Front-endb. Back-endc. Verticald. Horizontal
Q:
_______________CASE tools provide support for the planning, analysis, and design phases.a. Front-endb. Back-endc. Verticald. Horizontal
Q:
A(n) __________data dictionary is not updated automatically and usually requires a batch process to be run.a. activeb. passivec. staticd. dynamic
Q:
A(n)_____________ data dictionary is automatically updated by the DBMS with every database access.a. dynamicb. activec. passived. static
Q:
In the context of database usage monitoring, a(n)__________ is a file that automatically records a brief description of the database operations performed by all users.a. change trackerb. digital footprintc. paper traild. audit log
Q:
User-access management is a subset of_____________ .a. password protectionb. authorization managementc. data integrity managementd. managerial control
Q:
When performing user access management, a DBA defines each user to the database at the_____________ levels.a. application and DBMSb. operating system and DBMSc. operating system and applicationd. application and network
Q:
_________________security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.a. Debilitativeb. Preservingc. Corruptingd. Destructive
Q:
_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.a. Integrityb. Compliancec. Availabilityd. Confidentiality
Q:
__________________ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.a. Backup and recoveryb. System supportc. Performance monitoring and tuningd. Security auditing and monitoring
Q:
A(n)_____________ plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time.a. accessb. completionc. applicationd. communications
Q:
Which of the following is a reason why a DBMS's daily operations must be clearly documented?
a. Documentation of the daily operations help a company set its long-term goals.
b. Documentation of the daily operations help manage the manual data resources of a company.
c. Documentation of the daily operations help pinpoint causes and solutions of database problems.
d. Documentation of the daily operations help free the DBA from many lower-level technology-oriented tasks.
Q:
"A password must have a minimum of five characters" is an example of a________________ .a. policyb. rulec. procedured. standard
Q:
In the context of data backup and recovery, the activities of a___________ includes the DBA operations that are classified as disaster management.a. database programmerb. systems analystc. data administratord. database security officer
Q:
Instructions to create a password are an example of a_______________ .a. ruleb. policyc. standardd. procedure
Q:
"All users must have passwords" is an example of a______________ .a. ruleb. policyc. standardd. procedure
Q:
______________are written instructions that describe a series of steps to be followed during the performance of a given activity.a. Policiesb. Standardsc. Guidelinesd. Procedures
Q:
____________are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.a. Guidelinesb. Standardsc. Proceduresd. Documentations
Q:
__________________are general statements of direction or action that communicate and support DBA goals.a. Standardsb. Policiesc. Guidelinesd. Procedures
Q:
The ____________role of a DBA covers activities that involve evaluating, selecting, installing, and maintaining a DBMS and its related utilities and applications.a. technicalb. administrativec. manageriald. interactive
Q:
Coordinating, monitoring, and allocating database administration resources is included in a DBA's________ role.a. operativeb. arbitrationc. technicald. managerial
Q:
The__________ administrator is responsible for strategic planning.a. systemb. datac. databased. program
Q:
A data administrator is also known as a(n)______ .a. data security officerb. systems administratorc. information resource managerd. information engineering officer
Q:
Database administration operations are commonly defined and divided according to the phases of the ________.a. SLAb. DBLCc. SDLCd. MRA
Q:
The person responsible for the control of the centralized and shared database is the database______________ .a. analystb. administratorc. programmerd. user
Q:
When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n)_________ impact of the new database system.a. culturalb. managerialc. technicald. operational
Q:
At the level of middle management, the database must be able to_____________ .a. provide a framework for defining and enforcing organizational policiesb. provide the data necessary for tactical decisions and planningc. provide feedback to monitor whether a company is achieving its goalsd. provide access to external and internal data to identify growth opportunities
Q:
In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions in an organization's:a. lower levels.b. top levels.c. target markets.d. customer base.
Q:
A passive data dictionary is one that is updated automatically with every database access to keep its access information up to date.
a. True
b. False
Q:
The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.
a. True
b. False
Q:
When performing user access management, a DBA assigns passwords to each user at both the operating system and DBMS levels.
a. True
b. False
Q:
Protecting the security and integrity of a database is a function of authorization management.
a. True
b. False
Q:
In the context of database security measures, enforcing complex password policies will address the security vulnerabilities of the operating system component.
a. True
b. False
Q:
Security breaches can yield a database whose integrity is either preserved or corrupted.a. Trueb. False
Q:
A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
a. True
b. False
Q:
The maintenance activities of the DBA are an extension of the operational activities.
a. True
b. False
Q:
Training people to use the DBMS and its tools is not included in the responsibilities of a DBA.
a. True
b. False
Q:
System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
a. True
b. False
Q:
Testing procedures and standards must already be in place before any application program can be approved for use in the company.
a. True
b. False
Q:
The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department.
a. True
b. False
Q:
The DBA must supervise the installation of all software and hardware designated to support the data administration strategy.
a. True
b. False