Chapter 16 (Multiple Choice) CIS 3365

Beschreibung

asdf Quiz am Chapter 16 (Multiple Choice) CIS 3365, erstellt von . . am 08/09/2016.
. .
Quiz von . ., aktualisiert more than 1 year ago
. .
Erstellt von . . vor fast 8 Jahre
493
2

Zusammenfassung der Ressource

Frage 1

Frage
1.A DBMS facilitates ____.
Antworten
  • A) interpretation and presentation of data in useful formats
  • B) destruction of data and information to the right people at the right time
  • C) data presentation and data usage monitoring for adequate periods of time
  • D) automatic auditing of all data changes

Frage 2

Frage
2. At the level of middle management, the database must be able to ____.
Antworten
  • A) represent and support the company operations as closely as possible
  • B) deliver the data necessary for tactical decisions and planning
  • C) produce query results within specified performance levels
  • D) provide access to external and internal data to identify growth opportunities and to chart the direction of such growth

Frage 3

Frage
3.When introducing a database into an organization, a(n) ____ impact is likely because the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions.
Antworten
  • A) cultural
  • B) managerial
  • C) technical
  • D) operational

Frage 4

Frage
4.The person responsible for the control of the centralized and shared database is the database ____.
Antworten
  • A) analyst
  • B) administrator
  • C) programmer
  • D) user

Frage 5

Frage
5.It is common practice to define the DBA function by dividing the DBA operations according to the____ phases.
Antworten
  • A) SLA
  • B) DBLC
  • C) SDLC
  • D) MRA

Frage 6

Frage
6.There is a growing trend toward ____ in the data-management function.
Antworten
  • A) cross-training
  • B) encapsulation
  • C) specialization
  • D) centralization

Frage 7

Frage
7.The ____ administrator is responsible for strategic planning.
Antworten
  • A) system
  • B) data
  • C) database
  • D) program

Frage 8

Frage
8.The DBA’s ____ role is focused on personnel management and on interactions with the end-user community.
Antworten
  • A) administrative
  • B) arbitration
  • C) technical
  • D) managerial

Frage 9

Frage
9. As a manager, the DBA must concentrate on the ____ dimensions of the database administration function.
Antworten
  • A) control and planning
  • B) conflict and problem-resolution
  • C) policies and standards
  • D) security and privacy

Frage 10

Frage
10.The DBA’s ____ role covers activities involving the use of the DBMS.
Antworten
  • A) administrative
  • B) arbitration
  • C) technical
  • D) managerial

Frage 11

Frage
11.____ are general statements of direction or action that communicate and support DBA goals.
Antworten
  • A) standards
  • B) policies
  • C) documentation
  • D) procedures

Frage 12

Frage
12.____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.
Antworten
  • A) guidelines
  • B) standards
  • C) procedures
  • D) documentation

Frage 13

Frage
13.____ are written instructions that describe a series of steps to be followed during the performance of a given activity.
Antworten
  • A) policies
  • B) standards
  • C) documentation
  • D) procedures

Frage 14

Frage
14.“All users must have passwords” is an example of a ____.
Antworten
  • A) rule
  • B) policy
  • C) standard
  • D) procedure

Frage 15

Frage
15.Instructions to create a password are an example of a ____.
Antworten
  • A) rule
  • B) policy
  • C) standard
  • D) procedure

Frage 16

Frage
16. The ____ is responsible for ensuring database security and integrity.
Antworten
  • A) database programmer
  • B) systems analyst
  • C) data administrator
  • D) database security office

Frage 17

Frage
17.Procedures and standards must be revised at least ____ to keep them up-to date.
Antworten
  • A) weekly
  • B) monthly
  • C) every six months
  • D) annually

Frage 18

Frage
18.Current data distribution philosophy makes it easy for ____end users to access the database.
Antworten
  • A) limited
  • B) unauthorized
  • C) authorized
  • D) any

Frage 19

Frage
19.A(n) ____ plan is a set of instructions generated at application compilation time that predetermine show the application will access the database at run time.
Antworten
  • A) access
  • B) completion
  • C) application
  • D) communications

Frage 20

Frage
20.____activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.
Antworten
  • A) Backup and recovery
  • B) system support
  • C) performance monitoring and tuning
  • D) security auditing and monitoring

Frage 21

Frage
21.____deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.
Antworten
  • A) integrity
  • B) compliance
  • C) availability
  • D) confidentiality

Frage 22

Frage
22.____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
Antworten
  • A) Dangerous
  • B) Preserving
  • C) Corrupting
  • D) Authorized

Frage 23

Frage
23.____ management is designed to limit access to the database.
Antworten
  • A) Authorization
  • B) User access
  • C) View
  • D) DBMS utility

Frage 24

Frage
24. Some common physical security practices found in large database installations include secured entrances, password-protected workstations, ____, closed-circuit video, and voice-recognitiontechnology.
Antworten
  • A) drug testing
  • B) fingerprinting
  • C) electronic personnel badges
  • D) retina scans

Frage 25

Frage
25.User-access management is a subset of ____.
Antworten
  • A) password protection
  • B) authorization management
  • C) data integrity
  • D) managerial control

Frage 26

Frage
26.Classifying users into ____ according to common access needs facilitates the DBA’s job of controlling and managing the access privileges of individual users.
Antworten
  • A) user groups
  • B) sections
  • C) authorization schemes
  • D) policy definitions

Frage 27

Frage
27.Several DBMS packages contain features that allow the creation of a(n) ____, which automatically records a brief description of the database operations performed by all users.
Antworten
  • A) change tracker
  • B) digital footprint
  • C) paper trail
  • D) audit log

Frage 28

Frage
28.A(n) ____ data dictionary is automatically updated by the DBMS with every database access.
Antworten
  • A) dynamic
  • B) active
  • C) passive
  • D) static

Frage 29

Frage
29.A(n) ____ data dictionary is not updated automatically and usually requires a batch process to be run.
Antworten
  • A) active
  • B) passive
  • C) static
  • D) dynamic

Frage 30

Frage
30.____ CASE tools provide support for the planning, analysis, and design phases.
Antworten
  • A) Front-end
  • B) Back-end
  • C) Vertical
  • D) Horizontal

Frage 31

Frage
31.____ CASE tools provide support for the coding and implementation phases.
Antworten
  • A) Front-end
  • B) Back-end
  • C) Vertical
  • D) Horizontal

Frage 32

Frage
32.The ____ component of a CASE tool produces the information system’s input/output formats.
Antworten
  • A) analysis
  • B) graphics
  • C) program document generator
  • D) screen painter and report generator

Frage 33

Frage
33.____ allows for the translation of the company’s strategic goals into the data and applications that will help the company achieve those goals.
Antworten
  • A) Access Management
  • B) Business Intelligence
  • C) Information engineering (IE)
  • D) MOLAP

Frage 34

Frage
34.A(n) ____ serves as the basis for planning, development, and control of future information systems.
Antworten
  • A) access plan
  • B) active data dictionary
  • C) information systems architecture (ISA)
  • D) security policy

Frage 35

Frage
35.A(n) ____ is a logical storage space in Oracle.
Antworten
  • A) audit log
  • B) datafile
  • C) schema
  • D) tablespace

Frage 36

Frage
36.In the Oracle Enterprise Manager, a ____ is basically any object created by end users; for example, tables, views, indexes, stored procedures, and triggers.
Antworten
  • A) component
  • B) database object
  • C) policy
  • D) role

Frage 37

Frage
37.A ____ is a uniquely identifiable object that allows a given person to log on to the database.
Antworten
  • A) user
  • B) role
  • C) profile
  • D) manager

Frage 38

Frage
38.A ____ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.
Antworten
  • A) user
  • B) role
  • C) profile
  • D) manager

Frage 39

Frage
39.A ____ is a named collection of settings that control how much of the database resource a given user can use.
Antworten
  • A) user
  • B) role
  • C) profile
  • D) manager

Frage 40

Frage
40.One of the important functions provided by the database ____ is to reserve the resources that must be used by the database at run time.
Antworten
  • A) security component
  • B) authorization manager
  • C) initialization parameters
  • D) administrator
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

El Perdón
Alonso Linares
Investiga las transformaciones de la cultura y de la vida cotidiana a lo largo del tiempo.
Sherlyn Muñoz
Irene
i.biza
Sean doce balines (a,b,c,d,e,f,g,h,i,j,k,l)
andres parra
Funciones Polinomiales
Julieta Maya
Effective Citizens
Lauren Petrouleas
asdfas
bevan7
10.THE VALUATION PROCESS AND PRICING PROPERTIES
Brigita Safyra
S C I E X
guohao.lam
Perspectives of learning
nilemon
Mind Idea
rodrigo.cespedes