Computer Science Chapter 8 After The Database Designers Complete The Information level

subject Type Homework Help
subject Pages 9
subject Words 1478
subject Authors Mary Z. Last, Philip J. Pratt

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 8: Database Administration
1. In most cases, access to every table and field in a database is a necessity for every user.
a.
True
b.
False
2. The CEO of the company determines the database access privileges for all users.
a.
True
b.
False
3. Damage to a database can occur through a physical incident such as an abnormally terminated program.
a.
True
b.
False
4. The DBA creates security policies and procedures.
a.
True
b.
False
5. Management approval is not required before the security policies and procedures can be implemented.
a.
True
b.
False
6. To implement and enforce security, the DBA uses such features as encryption and views.
a.
True
b.
False
7. Programmers monitor database usage to detect potential security violations.
a.
True
b.
False
page-pf2
Chapter 8: Database Administration
8. To protect an organization’s data against physical damage, the DBA creates a disaster recovery plan.
a.
True
b.
False
9. The DBA is responsible for DBMS maintenance, data dictionary management, and training.
a.
True
b.
False
10. When a company decides to purchase a new DBMS, the CEO leads the DBMS evaluation and selection
effort.
a.
True
b.
False
11. SQL is an example of a nonprocedural language.
a.
True
b.
False
12. QBE is an example of a procedural language.
a.
True
b.
False
13. A shared lock permits other users to read the data in the database.
a.
True
b.
False
page-pf3
14. An internal company network that uses software tools typically used on the Internet and World Wide Web is
called an extranet.
a.
True
b.
False
15. Another term for production system is the test system.
a.
True
b.
False
16. The ____ determines the access privileges for all users and enters the appropriate authorization rules in the DBMS
catalog to ensure that users access the database only in ways in which they are entitled to do so.
a.
CEO
b.
programmer
c.
DBA
d.
IT manager
17. A ____ is a place where a record of certain corporate data is kept.
a.
depository
b.
data archive
c.
storage
d.
data bank
18. Which of the following DBMS evaluation categories does the following question relate to: Is it a simple catalog or
can it contain more content, such as information about programs and the various data items these programs access?
a.
Backup and recovery
b.
Data dictionary
c.
Security
d.
Integrity
page-pf4
Chapter 8: Database Administration
19. Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may
be locked and are exclusive locks the only ones permitted?
a.
Concurrent update
b.
Data recovery
c.
Data dictionary
d.
Security
20. ____ locks forbid any other user from accessing the data in any way.
a.
Shared
b.
Exclusive
c.
Limited
d.
Concurrent
21. Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow
partial copies and how does the DBMS handle updates to the same data from two or more replicas?
a.
Backup and recovery
b.
Security
c.
Integrity
d.
Replication and distributed databases
22. Which of the following DBMS evaluation categories does the following question relate to: How many files can you
open at the same time?
a.
Concurrent update
b.
Security
c.
Integrity
d.
Limitations
23. Which of the following DBMS evaluation categories does the following question relate to: On what operating system
and hardware is the DBMS supported?
a.
Concurrent update
b.
Security
c.
Limitations
d.
Limitations
page-pf5
Chapter 8: Database Administration
24. Which of the following DBMS evaluation categories does the following question relate to: What types of files can you
import or export?
a.
Cost
b.
Future plans
c.
Portability
d.
Performance
25. Which of the following DBMS evaluation categories does the following question relate to: Does the vendor of the
DBMS supply printed or online training manuals and how good are the manuals?
a.
Portability
b.
Performance
c.
Cost
d.
Documentation and training
26. ____ integrity is the constraint that says that the values in foreign keys must match values already in the database.
a.
Parallel
b.
Relational
c.
Conditional
d.
Referential
27. After the DBMS is purchased, the ____ has primary responsibility for installation and maintenance.
a.
IT manager
b.
DBA
c.
CEO
d.
user
28. The ____ establishes the naming conventions for tables, fields, and indexes in the data dictionary.
a.
users
b.
DBMS
page-pf6
Chapter 8: Database Administration
c.
DBA
d.
programmers
29. The ____ is responsible for providing training in the use of the DBMS.
a.
programmer
b.
analyst
c.
DBA
d.
CEO
30. After the database designers complete the information-level design, the DBA does the ____-level design.
a.
physical
b.
information
c.
logical
d.
graphical
31. In order to develop new programs, the programmers need access to the information in the DBMS. They are given
access to the ____.
a.
production system
b.
test system
c.
live system
d.
documentation system
32. Changing the database design to improve the performance is called ____.
a.
tending the design
b.
focusing the design
c.
tuning the design
d.
modifying the design
33. By default, Access and other DBMSs create indexes automatically for the ____ keys.
a.
primary and minor
page-pf7
Chapter 8: Database Administration
b.
alternate and foreign
c.
secondary and alternate
d.
primary and foreign
34. Tables with indexes allow faster searches, but slow performance on ____.
a.
insertions
b.
deletions
c.
updates
d.
selects
35. ____ converts a table that is in third normal form to a table no longer in third normal form.
a.
Conversion
b.
Denormalization
c.
Normalization
d.
Replication
36. ____________________ is the prevention of unauthorized access, either intentional or accidental, to a
database.
37. If a DBMS lacks essential security features, the _________________________ might create or purchase special
security programs that provide the missing features.
38. The ____________________ recovery plan specifies the ongoing and emergency actions and procedures
required to ensure data availability if a disaster occurs.
page-pf8
Chapter 8: Database Administration
39. A(n) ____________________ site is a backup site that is equipped with duplicate hardware and software but
not data.
40. Copies of archival files and database backups should be stored ____________________-site.
41. When the primary key cannot be null, this is known as ____________________.
42. A configuration of several computers connected together that allow users to share a variety of hardware and
software resources is known as a(n) _________________________.
43. ____________________ help means that if a user is having trouble and asks for help, the DBMS will
provide assistance for the particular feature being used at the time the user asks for help.
44. The _________________________ strictly controls the production system.
45. The hardware, software, and database for the users is called the ____________________ system.
page-pf9
46. What is the DBA’s role with regard to access privileges?
47. Discuss the steps that organizations take to protect their data against hard drive failures and electrical power
interruptions or outages.
48. What is a hot site?
49. With just two exceptions, the DBA grants access and update privileges to the production system only to
authorized users. What are the exceptions?
50. What can the DBA do if the organization has no additional money for its production system but needs
further performance improvements?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.