. .
Quiz by , created more than 1 year ago

asdf Quiz on Chapter 16 (Multiple Choice) CIS 3365, created by . . on 08/09/2016.

493
2
0
. .
Created by . . almost 8 years ago
Close

Chapter 16 (Multiple Choice) CIS 3365

Question 1 of 40

1

1.A DBMS facilitates ____.

Select one of the following:

  • A) interpretation and presentation of data in useful formats

  • B) destruction of data and information to the right people at the right time

  • C) data presentation and data usage monitoring for adequate periods of time

  • D) automatic auditing of all data changes

Explanation

Question 2 of 40

1

2. At the level of middle management, the database must be able to ____.

Select one of the following:

  • A) represent and support the company operations as closely as possible

  • B) deliver the data necessary for tactical decisions and planning

  • C) produce query results within specified performance levels

  • D) provide access to external and internal data to identify growth opportunities and to chart the direction of such growth

Explanation

Question 3 of 40

1

3.When introducing a database into an organization, a(n) ____ impact is likely because the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions.

Select one of the following:

  • A) cultural

  • B) managerial

  • C) technical

  • D) operational

Explanation

Question 4 of 40

1

4.The person responsible for the control of the centralized and shared database is the database ____.

Select one of the following:

  • A) analyst

  • B) administrator

  • C) programmer

  • D) user

Explanation

Question 5 of 40

1

5.It is common practice to define the DBA function by dividing the DBA operations according to the____ phases.

Select one of the following:

  • A) SLA

  • B) DBLC

  • C) SDLC

  • D) MRA

Explanation

Question 6 of 40

1

6.There is a growing trend toward ____ in the data-management function.

Select one of the following:

  • A) cross-training

  • B) encapsulation

  • C) specialization

  • D) centralization

Explanation

Question 7 of 40

1

7.The ____ administrator is responsible for strategic planning.

Select one of the following:

  • A) system

  • B) data

  • C) database

  • D) program

Explanation

Question 8 of 40

1

8.The DBA’s ____ role is focused on personnel management and on interactions with the end-user community.

Select one of the following:

  • A) administrative

  • B) arbitration

  • C) technical

  • D) managerial

Explanation

Question 9 of 40

1

9. As a manager, the DBA must concentrate on the ____ dimensions of the database administration function.

Select one of the following:

  • A) control and planning

  • B) conflict and problem-resolution

  • C) policies and standards

  • D) security and privacy

Explanation

Question 10 of 40

1

10.The DBA’s ____ role covers activities involving the use of the DBMS.

Select one of the following:

  • A) administrative

  • B) arbitration

  • C) technical

  • D) managerial

Explanation

Question 11 of 40

1

11.____ are general statements of direction or action that communicate and support DBA goals.

Select one of the following:

  • A) standards

  • B) policies

  • C) documentation

  • D) procedures

Explanation

Question 12 of 40

1

12.____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.

Select one of the following:

  • A) guidelines

  • B) standards

  • C) procedures

  • D) documentation

Explanation

Question 13 of 40

1

13.____ are written instructions that describe a series of steps to be followed during the performance of a given activity.

Select one of the following:

  • A) policies

  • B) standards

  • C) documentation

  • D) procedures

Explanation

Question 14 of 40

1

14.“All users must have passwords” is an example of a ____.

Select one of the following:

  • A) rule

  • B) policy

  • C) standard

  • D) procedure

Explanation

Question 15 of 40

1

15.Instructions to create a password are an example of a ____.

Select one of the following:

  • A) rule

  • B) policy

  • C) standard

  • D) procedure

Explanation

Question 16 of 40

1

16. The ____ is responsible for ensuring database security and integrity.

Select one of the following:

  • A) database programmer

  • B) systems analyst

  • C) data administrator

  • D) database security office

Explanation

Question 17 of 40

1

17.Procedures and standards must be revised at least ____ to keep them up-to date.

Select one of the following:

  • A) weekly

  • B) monthly

  • C) every six months

  • D) annually

Explanation

Question 18 of 40

1

18.Current data distribution philosophy makes it easy for ____end users to access the database.

Select one of the following:

  • A) limited

  • B) unauthorized

  • C) authorized

  • D) any

Explanation

Question 19 of 40

1

19.A(n) ____ plan is a set of instructions generated at application compilation time that predetermine show the application will access the database at run time.

Select one of the following:

  • A) access

  • B) completion

  • C) application

  • D) communications

Explanation

Question 20 of 40

1

20.____activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.

Select one of the following:

  • A) Backup and recovery

  • B) system support

  • C) performance monitoring and tuning

  • D) security auditing and monitoring

Explanation

Question 21 of 40

1

21.____deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

Select one of the following:

  • A) integrity

  • B) compliance

  • C) availability

  • D) confidentiality

Explanation

Question 22 of 40

1

22.____ security breaches include database access by computer viruses and by
hackers whose actions are designed to destroy or alter data.

Select one of the following:

  • A) Dangerous

  • B) Preserving

  • C) Corrupting

  • D) Authorized

Explanation

Question 23 of 40

1

23.____ management is designed to limit access to the database.

Select one of the following:

  • A) Authorization

  • B) User access

  • C) View

  • D) DBMS utility

Explanation

Question 24 of 40

1

24. Some common physical security practices found in large database installations include secured entrances, password-protected workstations, ____, closed-circuit video, and voice-recognitiontechnology.

Select one of the following:

  • A) drug testing

  • B) fingerprinting

  • C) electronic personnel badges

  • D) retina scans

Explanation

Question 25 of 40

1

25.User-access management is a subset of ____.

Select one of the following:

  • A) password protection

  • B) authorization management

  • C) data integrity

  • D) managerial control

Explanation

Question 26 of 40

1

26.Classifying users into ____ according to common access needs facilitates the DBA’s job of controlling and managing the access privileges of individual users.

Select one of the following:

  • A) user groups

  • B) sections

  • C) authorization schemes

  • D) policy definitions

Explanation

Question 27 of 40

1

27.Several DBMS packages contain features that allow the creation of a(n) ____, which automatically records a brief description of the database operations performed by all users.

Select one of the following:

  • A) change tracker

  • B) digital footprint

  • C) paper trail

  • D) audit log

Explanation

Question 28 of 40

1

28.A(n) ____ data dictionary is automatically updated by the DBMS with every database access.

Select one of the following:

  • A) dynamic

  • B) active

  • C) passive

  • D) static

Explanation

Question 29 of 40

1

29.A(n) ____ data dictionary is not updated automatically and usually requires a batch process to be run.

Select one of the following:

  • A) active

  • B) passive

  • C) static

  • D) dynamic

Explanation

Question 30 of 40

1

30.____ CASE tools provide support for the planning, analysis, and design phases.

Select one of the following:

  • A) Front-end

  • B) Back-end

  • C) Vertical

  • D) Horizontal

Explanation

Question 31 of 40

1

31.____ CASE tools provide support for the coding and implementation phases.

Select one of the following:

  • A) Front-end

  • B) Back-end

  • C) Vertical

  • D) Horizontal

Explanation

Question 32 of 40

1

32.The ____ component of a CASE tool produces the information system’s input/output formats.

Select one of the following:

  • A) analysis

  • B) graphics

  • C) program document generator

  • D) screen painter and report generator

Explanation

Question 33 of 40

1

33.____ allows for the translation of the company’s strategic goals into the data and applications that will help the company achieve those goals.

Select one of the following:

  • A) Access Management

  • B) Business Intelligence

  • C) Information engineering (IE)

  • D) MOLAP

Explanation

Question 34 of 40

1

34.A(n) ____ serves as the basis for planning, development, and control of future information systems.

Select one of the following:

  • A) access plan

  • B) active data dictionary

  • C) information systems architecture (ISA)

  • D) security policy

Explanation

Question 35 of 40

1

35.A(n) ____ is a logical storage space in Oracle.

Select one of the following:

  • A) audit log

  • B) datafile

  • C) schema

  • D) tablespace

Explanation

Question 36 of 40

1

36.In the Oracle Enterprise Manager, a ____ is basically any object created by end users; for example, tables, views, indexes, stored procedures, and triggers.

Select one of the following:

  • A) component

  • B) database object

  • C) policy

  • D) role

Explanation

Question 37 of 40

1

37.A ____ is a uniquely identifiable object that allows a given person to log on to the database.

Select one of the following:

  • A) user

  • B) role

  • C) profile

  • D) manager

Explanation

Question 38 of 40

1

38.A ____ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.

Select one of the following:

  • A) user

  • B) role

  • C) profile

  • D) manager

Explanation

Question 39 of 40

1

39.A ____ is a named collection of settings that control how much of the database resource a given user can use.

Select one of the following:

  • A) user

  • B) role

  • C) profile

  • D) manager

Explanation

Question 40 of 40

1

40.One of the important functions provided by the database ____ is to reserve the resources that must be used by the database at run time.

Select one of the following:

  • A) security component

  • B) authorization manager

  • C) initialization parameters

  • D) administrator

Explanation