Filters
Question type

Study Flashcards

A security is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

Correct Answer

verifed

verified

_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.


A) Backup and recovery
B) System support
C) Performance monitoring and tuning
D) Security auditing and monitoring

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Testing procedures and standards must already be in place before any application program can be approved for use in the company.

A) True
B) False

Correct Answer

verifed

verified

Training people to use the DBMS and its tools is not included in the responsibilities of a DBA.

A) True
B) False

Correct Answer

verifed

verified

security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.


A) Debilitative
B) Preserving
C) Corrupting
D) Destructive

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

At the level of middle management,the database must be able to .


A) provide a framework for defining and enforcing organizational policies
B) provide the data necessary for tactical decisions and planning
C) provide feedback to monitor whether a company is achieving its goals
D) provide access to external and internal data to identify growth opportunities

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

The administrator is responsible for strategic planning.


A) system
B) data
C) database
D) program

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

The maintenance activities of the DBA are an extension of the operational activities.

A) True
B) False

Correct Answer

verifed

verified

When performing user access management,a DBA defines each user to the database at the levels.


A) application and DBMS
B) operating system and DBMS
C) operating system and application
D) application and network

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

In the context of an organization's managerial structure,decisions are short term and affect only daily operations; for example,deciding to change the price of a product to clear it from inventory.

Correct Answer

verifed

verified

One of the important functions provided by the database is to reserve the resources that must be used by the database at run time.


A) security component
B) authorization manager
C) initialization parameters
D) administrator

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.

A) True
B) False

Correct Answer

verifed

verified

Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.

A) True
B) False

Correct Answer

verifed

verified

A(n)_____ physically stores the database's data.

Correct Answer

verifed

verified

When performing user access management,a DBA assigns passwords to each user at both the operating system and DBMS levels.

A) True
B) False

Correct Answer

verifed

verified

Within the data security framework,is concerned with keeping data consistent and free of errors or anomalies.

Correct Answer

verifed

verified

The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.

A) True
B) False

Correct Answer

verifed

verified

The DBA function provides data modeling and design services to the end-user community,often through coordination with an application development group within the data-processing department.

A) True
B) False

Correct Answer

verifed

verified

In the context of database administration,is the extent to which individuals and organizations have the right to determine the "who,what,when,where,and how" of data usage.

Correct Answer

verifed

verified

A(n) data dictionary is automatically updated by the DBMS with every database access.


A) dynamic
B) active
C) passive
D) static

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Showing 61 - 80 of 81

Related Exams

Show Answer