Chapter 15 An enterprise database can be defined as the company’s

subject Type Homework Help
subject Pages 9
subject Words 3019
subject Authors Carlos Coronel, Steven Morris

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
CHAPTER 15: DATABASE ADMINISTRATION AND SECURITY
1. The DBMS must provide tools that give each level of management a useful view of the data and support the
required level of decision-making.
a. True
b. False
2. An enterprise database can be defined as the company's data representation that provides support for all present
and expected future operations.
a. True
3. Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions
required by managers.
a. True
b. False
4. The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact
throughout the organization.
a. True
b. False
5. The DBA interacts with the end user by providing data and information support services to the organization’s
departments.
a. True
b. False
6. The security, privacy, and integrity of data in a database are of minimal concern to DBAs who manage current
DBMS installations.
a. True
b. False
7. Disaster management includes all the end-user activities designed to secure data availability before a physical
disaster or a database integrity failure.
a. True
b. False
page-pf2
Chapter 15: Database Administration and Security
8. A full backup, or database dump, produces a complete copy of the entire database.
a. True
b. False
9. Incremental backups produce a backup of all data.
a. True
b. False
10. Concurrent backups take place while the user is working on the database.
a. True
b. False
11. Backups must be clearly identified through detailed descriptions and date information, assuring that the correct
backup is used to recover the database.
a. True
b. False
12. The storage locations for multiple backups must include sites inside and outside the organization.
a. True
b. False
13. In the context of database administration, standards are written instructions that describe a series of steps to be
followed during the performance of a given activity.
a. True
b. False
14. The DBA or security officer must secure an insurance policy to provide financial protection in the event of a
database failure.
a. True
b. False
15. The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in
the right format.
a. True
b. False
page-pf3
Chapter 15: Database Administration and Security
16. When an organization employs both a DA and a DBA, the DA's job has a technical orientation, whereas the
DBA's job has a managerial orientation.
a. True
b. False
17. The DBA must supervise the installation of all software and hardware designated to support the data
administration strategy.
a. True
b. False
18. The DBA function provides data modeling and design services to the end-user community, often through
coordination with an application development group within the data-processing department.
a. True
b. False
19. Testing procedures and standards must already be in place before any application program can be approved for
use in the company.
a. True
b. False
20. System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its
applications.
a. True
b. False
21. Training people to use the DBMS and its tools is not included in the responsibilities of a DBA.
a. True
b. False
22. The maintenance activities of the DBA are an extension of the operational activities.
a. True
b. False
page-pf4
Chapter 15: Database Administration and Security
23. A security breach is a weakness in a system component that could be exploited to allow unauthorized access or
cause service disruptions.
a. True
b. False
24. Security breaches can yield a database whose integrity is either preserved or corrupted.
a. True
b. False
25. In the context of database security measures, enforcing complex password policies will address the security
vulnerabilities of the operating system component.
a. True
b. False
26. Protecting the security and integrity of a database is a function of authorization management.
a. True
b. False
and DBMS levels.
a. True
b. False
28. The DBA can use an audit log to automatically record a brief description of the database operations performed
by the users.
a. True
b. False
29. A passive data dictionary is one that is updated automatically with every database access to keep its access
information up to date.
a. True
b. False
page-pf5
Chapter 15: Database Administration and Security
30. In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions in
an organization's:
a. lower levels.
b. top levels.
c. target markets.
d. customer base.
a. provide a framework for defining and enforcing organizational policies
b. provide the data necessary for tactical decisions and planning
c. provide feedback to monitor whether a company is achieving its goals
d. provide access to external and internal data to identify growth opportunities
32. When introducing a database into an organization, the database approach creates a more controlled and
structured information flow and thus affects people, functions, and interactions. This leads to a(n) impact
of the new database system.
a. cultural b. managerial
c. technical d. operational
33. The person responsible for the control of the centralized and shared database is the database .
a. analyst b. administrator
c. programmer d. user
34. Database administration operations are commonly defined and divided according to the phases of the .
a. SLA b. DBLC
c. SDLC d. MRA
35. A data administrator is also known as a(n) .
a. data security officer b. systems administrator
c. information resource manager d. information engineering officer
36. The administrator is responsible for strategic planning.
a. system b. data
c. database d. program
page-pf6
Chapter 15: Database Administration and Security
37. Coordinating, monitoring, and allocating database administration resources is included in a DBA's role.
a. operative b. arbitration
c. technical d. managerial
38. The role of a DBA covers activities that involve evaluating, selecting, installing, and maintaining a
DBMS and its related utilities and applications.
a. technical b. administrative
c. managerial d. interactive
39. are general statements of direction or action that communicate and support DBA goals.
a. Standards b. Policies
c. Guidelines d. Procedures
40. are more detailed and specific than policies and describe the minimum requirements of a given DBA
activity.
a. Guidelines b. Standards
c. Procedures d. Documentations
41. are written instructions that describe a series of steps to be followed during the performance of a given
activity.
a. Policies b. Standards
c. Guidelines d. Procedures
42. “All users must have passwords” is an example of a .
a. rule b. policy
c. standard d. procedure
43. Instructions to create a password are an example of a .
a. rule b. policy
c. standard d. procedure
44. In the context of data backup and recovery, the activities of a includes the DBA operations that are
classified as disaster management.
a. database programmer b. systems analyst
c. data administrator d. database security officer
page-pf7
Chapter 15: Database Administration and Security
45. “A password must have a minimum of five characters” is an example of a .
a. policy b. rule
c. procedure d. standard
46. Which of the following is a reason why a DBMS's daily operations must be clearly documented?
a. Documentation of the daily operations help a company set its long-term goals.
b. Documentation of the daily operations help manage the manual data resources of a company.
c. Documentation of the daily operations help pinpoint causes and solutions of database problems.
d. Documentation of the daily operations help free the DBA from many lower-level technology-oriented tasks.
47. A(n) plan is a set of instructions generated at application compilation time that predetermines how the
application will connect to and communicate with the database at run time.
a. access b. completion
c. application d. communications
48. _____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.
a. Backup and recovery b. System support
c. Performance monitoring and tuning d. Security auditing and monitoring
49. _____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an
authorized user, that the data are used only for an authorized purpose.
a. Integrity b. Compliance
c. Availability d. Confidentiality
50. security breaches include database access by computer viruses and by hackers whose actions are
designed to destroy or alter data.
a. Debilitative b. Preserving
c. Corrupting d. Destructive
51. When performing user access management, a DBA defines each user to the database at the levels.
a. application and DBMS b. operating system and DBMS
c. operating system and application d. application and network
page-pf8
Chapter 15: Database Administration and Security
52. User-access management is a subset of .
a. password protection b. authorization management
c. data integrity management d. managerial control
53. In the context of database usage monitoring, a(n) is a file that automatically records a brief description of
the database operations performed by all users.
a. change tracker b. digital footprint
c. paper trail d. audit log
54. A(n) data dictionary is automatically updated by the DBMS with every database access.
a. dynamic b. active
c. passive d. static
55. A(n) data dictionary is not updated automatically and usually requires a batch process to be run.
a. active b. passive
c. static d. dynamic
56. CASE tools provide support for the planning, analysis, and design phases.
a. Front-end b. Back-end
c. Vertical d. Horizontal
57. CASE tools provide support for the coding and implementation phases.
a. Front-end b. Back-end
c. Vertical d. Horizontal
58. The component of a CASE tool produces the information system’s input/output formats.
a. analysis b. graphics
c. program document generator d. screen painter and report generator
59. allows for the translation of the company’s strategic goals into the data and applications that will help the
company achieve those goals.
a. Access Management b. Business Intelligence
c. Information engineering (IE) d. MOLAP
page-pf9
Chapter 15: Database Administration and Security
60. In the context of developing a data administration strategy, a(n) provides a framework that includes
computerized, automated, and integrated tools such as a DBMS and CASE tools.
a. access plan
b. active data dictionary
c. information systems architecture
d. security policy
61. A(n) is a logical storage area in Oracle.
a. audit log b. datafile
c. schema d. tablespace
62. In the context of the Oracle Enterprise Manager, a(n) is a uniquely identifiable object that allows a given
person to log on to the database.
a. user b. role
c. profile d. client
63. In the context of the Oracle Enterprise Manager, a(n) is a named collection of database access privileges
that authorize a user to connect to the database and use the database system resources.
a. license b. role
c. profile d. quota
64. In the context of the Oracle Enterprise Manager, a is a named collection of settings that control how
much of the database resource a given user can use.
a. license b. role
c. profile d. constraint
65. One of the important functions provided by the database is to reserve the resources that must be used by
the database at run time.
a. security component b. authorization manager
c. initialization parameters d. administrator
66. In the context of data quality management tools, software is one that gathers statistics, analyzes existing
data sources and metadata to determine patterns, and compares the patterns against standards that the
organization has defined.
page-pfa
Chapter 15: Database Administration and Security
67. In the context of an organization's managerial structure, decisions are short term and affect only daily
operations; for example, deciding to change the price of a product to clear it from inventory.
68. In the context of database administration, is the extent to which individuals and organizations have the
right to determine the “who, what, when, where, and how” of data usage.
69. The aspect of introducing a DBMS in an organization deals with hardware and software changes in the
organization.
70. In the context of the advancements in DBMS technology, the use of data services can free the DBA
from many lower-level technology-oriented tasks.
71. In case a company installs several incompatible databases and assigns a DBA for each of them, the general
coordinator of all such DBAs is known as the administrator.
72. The , also known as the information resource manager (IRM), usually reports directly to top management
and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap.
73. Based on the type of decision-making support required, database users may be classified into: operational,
tactical, or _____.
74. The requirement that a password must have a maximum of 12 characters is an example of a(n) .
75. The DSO’s activities are often classified as management, which includes all DBA activities designed to
ensure data availability following a physical calamity or a database integrity failure.
76. In the context of ensuring integrity of a database, a(n) transaction is one that does not overload the
DBMS.
77. The DBA must review the database application design to ensure that transactions are , meaning that they
mirror real-world events.
page-pfb
Chapter 15: Database Administration and Security
78. Performance monitoring and activities are designed to ensure that the DBMS, utilities, and applications
maintain satisfactory performance levels.
79. Within the data security framework, is concerned with keeping data consistent and free of errors or
anomalies.
80. A security is a weakness in a system component that could be exploited to allow unauthorized access or
cause service disruptions.
81. A(n) _____ physically stores the database’s data.
82. Describe the DBA’s managerial role.
83. Explain user requirements gathering as part of the DBA's end-user support services.
84. Explain conflict and problem resolution as part of the DBA’s enduser support services.
85. Describe the need for convenient and safe backup storage.
page-pfc
Chapter 15: Database Administration and Security
86. The testing and evaluation of a database application cover all aspects of the systemfrom the simple collection
and creation of data to its use and retirement. What is covered by the evaluation process?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.