Deck 4: IT Security Part II: Auditing Database Systems

ملء الشاشة (f)
exit full mode
سؤال
A recovery module suspends all data processing while the system reconciles its journal files against the database.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
To the user,data processing procedures for routine transactions,such as entering sales orders,appear to be identical in the database environment and in the traditional environment.
سؤال
The data dictionary describes all of the data elements in the database.
سؤال
Under the database approach,data is viewed as proprietary or owned by users.
سؤال
Subschemas are used to authorize user access privileges to specific data elements.
سؤال
The database management system provides a controlled environment for accessing the database.
سؤال
A deadlock is a phenomenon that prevents the processing of transactions.
سؤال
In the relational model,a data element is called a relation.
سؤال
Data normalization groups data attributes into tables in accordance with specific design objectives.
سؤال
Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.
سؤال
A join builds a new table by creating links.
سؤال
In the database method of data management,access authority is maintained by systems programming.
سؤال
The data definition language is used to insert special database commands into application programs.
سؤال
There is more than one conceptual view of the database.
سؤال
A customer name and an unpaid balance is an example of a one-to-many relationship.
سؤال
The database management system controls access to program files.
سؤال
The physical database is an abstract representation of the database.
سؤال
The database approach to data management is sometimes called the flat file approach.
سؤال
Timestamping is a control that is used to ensure database partitioning.
سؤال
An important feature associated with the traditional approach to data management is the ability to produce ad hoc reports.
سؤال
Which of the following may provide many distinct views of the database?

A) the schema
B) the internal view
C) the user view
D) the conceptual view
سؤال
A description of the physical arrangement of records in the database is

A) the internal view
B) the conceptual view
C) the subschema
D) the external view
سؤال
The data manipulation language

A) defines the database to the database management system
B) transfers data to the buffer area for manipulation
C) enables application programs to interact with and manipulate the database
D) describes every data element in the database
سؤال
Users access the database

A) by direct query
B) by developing operating software
C) by constantly interacting with systems programmers
D) all of the above
سؤال
The data definition language

A) identifies, for the database management system, the names and relationships of all data elements, records, and files that comprise the database
B) inserts database commands into application programs to enable standard programs to interact with and manipulate the database
C) permits users to process data in the database without the need for conventional programs
D) describes every data element in the database
سؤال
An ER diagram is a graphical representation of a data model.
سؤال
Which characteristic is associated with the database approach to data management?

A) data sharing
B) multiple storage procedures
C) data redundancy
D) excessive storage costs
سؤال
A lockout is a software control that prevents multiple users from simultaneous access to data.
سؤال
The task of searching the database to locate a stored record for processing is called

A) data deletion
B) data storage
C) data attribution
D) data retrieval
سؤال
All of the following are basic data management tasks except

A) data deletion
B) data storage
C) data attribution
D) data retrieval
سؤال
Which statement is not correct? A query language like SQL

A) is written in a fourth-generation language
B) requires user familiarity with COBOL
C) allows users to retrieve and modify data
D) reduces reliance on programmers
سؤال
Which characteristic is not associated with the database approach to data management?

A) the ability to process data without the help of a programmer
B) the ability to control access to the data
C) constant production of backups
D) the inability to determine what data is available
سؤال
In a hierarchical model

A) links between related records are implicit
B) the way to access data is by following a predefined data path
C) an owner (parent) record may own just one member (child) record
D) a member (child) record may have more than one owner (parent)
سؤال
The term occurrence is used to describe the number of attributes or fields pertaining to a specific entity.
سؤال
An entity is any physical thing about which the organization wishes to capture data.
سؤال
Cardinality describes the number of possible occurrences in one table that are associated with a single occurrence in a related table.
سؤال
Which of the following is not a problem usually associated with the flat-file approach to data management?

A) data redundancy
B) restricting access to data to the primary user
C) data storage
D) currency of information
سؤال
Which duty is not the responsibility of the database administrator?

A) to develop and maintain the data dictionary
B) to implement security controls
C) to design application programs
D) to design the subschema
سؤال
Which of the following is not a responsibility of the database management system?

A) provide an interface between the users and the physical database
B) provide security against a natural disaster
C) ensure that the internal schema and external schema are consistent
D) authorize access to portions of the database
سؤال
The textbook refers to four interrelated components of the database concept.Which of the following is not one of the components?

A) the database management system
B) the database sdministrator
C) the physical database
D) the conceptual database
سؤال
Which term is not associated with the relational database model?

A) tuple
B) attribute
C) collision
D) relation
سؤال
What control maintains complete,current,and consistent data at all information processing units?

A) deadlock control
B) replication control
C) concurrency control
D) gateway control
سؤال
In the relational database model all of the following are true except

A) data is presented to users as tables
B) data can be extracted from specified rows from specified tables
C) a new table can be built by joining two tables
D) only one-to-many relationships can be supported
سؤال
Data currency is preserved in a centralized database by

A) partitioning the database
B) using a lockout procedure
C) replicating the database
D) implementing concurrency controls
سؤال
Which procedure will prevent two end users from accessing the same data element at the same time?

A) data redundancy
B) data replication
C) data lockout
D) none of the above
سؤال
Which of the following is not a common form of conceptual database model?

A) hierarchical
B) network
C) sequential
D) relational
سؤال
The advantages of a partitioned database include all of the following except

A) user control is enhanced
B) data transmission volume is increased
C) response time is improved
D) risk of destruction of entire database is reduced
سؤال
Data concurrency

A) is a security issue in partitioned databases
B) is implemented using timestamping
C) may result in data lockout
D) occurs when a deadlock is triggered
سؤال
In the relational database model

A) relationships are explicit
B) the user perceives that files are linked using pointers
C) data is represented on two-dimensional tables
D) data is represented as a tree structure
سؤال
Which of the following is a level of the database that is defined by the data definition language?

A) user view
B) schema
C) internal view
D) all are levels or views of the database
سؤال
An example of a distributed database is

A) partitioned database
B) centralized database
C) networked database
D) all are examples of distributed databases
سؤال
When creating and controlling backups for a sequential batch system,

A) the number of backup versions retained depends on the amount of data in the file
B) off-site backups are not required
C) backup files can never be used for scratch files
D) the more significant the data, the greater the number of backup versions
سؤال
A replicated database is appropriate when

A) there is minimal data sharing among information processing units
B) there exists a high degree of data sharing and no primary user
C) there is no risk of the deadlock phenomenon
D) most data sharing consists of read-write transactions
سؤال
In a direct access file system

A) backups are created using the grandfather-father-son approach
B) processing a transaction file against a maser file creates a backup file
C) files are backed up immediately before an update run
D) if the master file is destroyed, it cannot be reconstructed
سؤال
All of the following are elements of the DBMS which facilitate user access to the database except

A) query language
B) data access language
C) data manipulation language
D) data definition language
سؤال
All of the following are advantages of a partitioned database except

A) increased user control by having the data stored locally
B) deadlocks are eliminated
C) transaction processing response time is improved
D) partitioning can reduce losses in case of disaster
سؤال
Which backup technique is most appropriate for sequential batch systems?

A) grandparent-parent-child approach
B) staggered backup approach
C) direct backup
D) remote site, intermittent backup
سؤال
In a relational database

A) the user's view of the physical database is the same as the physical database
B) users perceive that they are manipulating a single table
C) a virtual table exists in the form of rows and columns of a table stored on the disk
D) a programming language (COBOL) is used to create a user's view of the database
سؤال
Which of the following is not an access control in a database system?

A) antivirus software
B) database authorization table
C) passwords
D) voice prints
سؤال
Which statement is false?

A) The DBMS is special software that is programmed to know which data elements each user is authorized to access.
B) User programs send requests for data to the DBMS.
C) During processing, the DBMS periodically makes backup copies of the physical database.
D) The DBMS does not control access to the database.
سؤال
What are two types of distributed databases?
سؤال
What is the partitioned database approach and what are its advantages?
سؤال
Describe two tests of controls that would provide evidence that the database management system is protected against unauthorized access attempts.
سؤال
Describe an environment in which a firm should use a partitioned database.
سؤال
Use the following words to complete the sentences in questions 1 through 5.
Use the following words to complete the sentences in questions 1 through 5.   The __________________________ authorizes access to the database.<div style=padding-top: 35px>
The __________________________ authorizes access to the database.
سؤال
What is a database authorization table?
سؤال
Why are the hierarchical and network models called navigational databases?
سؤال
Use the following words to complete the sentences in questions 1 through 5.
Use the following words to complete the sentences in questions 1 through 5.   The ____________________ allows users to retrieve and modify data easily.<div style=padding-top: 35px>
The ____________________ allows users to retrieve and modify data easily.
سؤال
Which of the following is not a basic database backup and recovery feature?

A) checkpoint
B) backup database
C) transaction log
D) database authority table
سؤال
Use the following words to complete the sentences in questions 1 through 5.
Use the following words to complete the sentences in questions 1 through 5.   _________________________ occurs when a specific file is reproduced for each user who needs access to the file.<div style=padding-top: 35px>
_________________________ occurs when a specific file is reproduced for each user who needs access to the file.
سؤال
Use the following words to complete the sentences in questions 1 through 5.
Use the following words to complete the sentences in questions 1 through 5.   The conceptual view of the database is often called ____________________.<div style=padding-top: 35px>
The conceptual view of the database is often called ____________________.
سؤال
What is a legacy system?
سؤال
Which of the following is not a test of access controls?

A) biometric controls
B) encryption controls
C) backup controls
D) inference controls
سؤال
What is a replicated database and what are the advantages of this approach?
سؤال
What is a database lockout?
سؤال
Audit objectives for the database management system include all of the following except

A) verifying that the security group monitors and reports on fault tolerance violations
B) confirming that backup procedures are adequate
C) ensuring that authorized users access only those files they need to perform their duties
D) verifying that unauthorized users cannot access data files
سؤال
Use the following words to complete the sentences in questions 1 through 5.
Use the following words to complete the sentences in questions 1 through 5.   The __________________________ describes every data element in the database.<div style=padding-top: 35px>
The __________________________ describes every data element in the database.
سؤال
All of the following tests of controls will provide evidence that access to the data files is limited except

A) inspecting biometric controls
B) reconciling program version numbers
C) comparing job descriptions with access privileges stored in the authority table
D) attempting to retrieve unauthorized data via inference queries
سؤال
The database attributes that individual users have permission to access are defined in

A) operating system.
B) user manual.
C) database schema.
D) user view.
E) application listing.
سؤال
How does the database approach solve the problem of data redundancy?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/101
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: IT Security Part II: Auditing Database Systems
1
A recovery module suspends all data processing while the system reconciles its journal files against the database.
False
2
To the user,data processing procedures for routine transactions,such as entering sales orders,appear to be identical in the database environment and in the traditional environment.
True
3
The data dictionary describes all of the data elements in the database.
True
4
Under the database approach,data is viewed as proprietary or owned by users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
5
Subschemas are used to authorize user access privileges to specific data elements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
6
The database management system provides a controlled environment for accessing the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
7
A deadlock is a phenomenon that prevents the processing of transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
8
In the relational model,a data element is called a relation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
9
Data normalization groups data attributes into tables in accordance with specific design objectives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
10
Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
11
A join builds a new table by creating links.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
12
In the database method of data management,access authority is maintained by systems programming.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
13
The data definition language is used to insert special database commands into application programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
14
There is more than one conceptual view of the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
15
A customer name and an unpaid balance is an example of a one-to-many relationship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
16
The database management system controls access to program files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
17
The physical database is an abstract representation of the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
18
The database approach to data management is sometimes called the flat file approach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
19
Timestamping is a control that is used to ensure database partitioning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
20
An important feature associated with the traditional approach to data management is the ability to produce ad hoc reports.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following may provide many distinct views of the database?

A) the schema
B) the internal view
C) the user view
D) the conceptual view
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
22
A description of the physical arrangement of records in the database is

A) the internal view
B) the conceptual view
C) the subschema
D) the external view
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
23
The data manipulation language

A) defines the database to the database management system
B) transfers data to the buffer area for manipulation
C) enables application programs to interact with and manipulate the database
D) describes every data element in the database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
24
Users access the database

A) by direct query
B) by developing operating software
C) by constantly interacting with systems programmers
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
25
The data definition language

A) identifies, for the database management system, the names and relationships of all data elements, records, and files that comprise the database
B) inserts database commands into application programs to enable standard programs to interact with and manipulate the database
C) permits users to process data in the database without the need for conventional programs
D) describes every data element in the database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
26
An ER diagram is a graphical representation of a data model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which characteristic is associated with the database approach to data management?

A) data sharing
B) multiple storage procedures
C) data redundancy
D) excessive storage costs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
28
A lockout is a software control that prevents multiple users from simultaneous access to data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
29
The task of searching the database to locate a stored record for processing is called

A) data deletion
B) data storage
C) data attribution
D) data retrieval
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
30
All of the following are basic data management tasks except

A) data deletion
B) data storage
C) data attribution
D) data retrieval
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which statement is not correct? A query language like SQL

A) is written in a fourth-generation language
B) requires user familiarity with COBOL
C) allows users to retrieve and modify data
D) reduces reliance on programmers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which characteristic is not associated with the database approach to data management?

A) the ability to process data without the help of a programmer
B) the ability to control access to the data
C) constant production of backups
D) the inability to determine what data is available
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
33
In a hierarchical model

A) links between related records are implicit
B) the way to access data is by following a predefined data path
C) an owner (parent) record may own just one member (child) record
D) a member (child) record may have more than one owner (parent)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
34
The term occurrence is used to describe the number of attributes or fields pertaining to a specific entity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
35
An entity is any physical thing about which the organization wishes to capture data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
36
Cardinality describes the number of possible occurrences in one table that are associated with a single occurrence in a related table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following is not a problem usually associated with the flat-file approach to data management?

A) data redundancy
B) restricting access to data to the primary user
C) data storage
D) currency of information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which duty is not the responsibility of the database administrator?

A) to develop and maintain the data dictionary
B) to implement security controls
C) to design application programs
D) to design the subschema
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following is not a responsibility of the database management system?

A) provide an interface between the users and the physical database
B) provide security against a natural disaster
C) ensure that the internal schema and external schema are consistent
D) authorize access to portions of the database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
40
The textbook refers to four interrelated components of the database concept.Which of the following is not one of the components?

A) the database management system
B) the database sdministrator
C) the physical database
D) the conceptual database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
41
Which term is not associated with the relational database model?

A) tuple
B) attribute
C) collision
D) relation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
42
What control maintains complete,current,and consistent data at all information processing units?

A) deadlock control
B) replication control
C) concurrency control
D) gateway control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
43
In the relational database model all of the following are true except

A) data is presented to users as tables
B) data can be extracted from specified rows from specified tables
C) a new table can be built by joining two tables
D) only one-to-many relationships can be supported
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
44
Data currency is preserved in a centralized database by

A) partitioning the database
B) using a lockout procedure
C) replicating the database
D) implementing concurrency controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which procedure will prevent two end users from accessing the same data element at the same time?

A) data redundancy
B) data replication
C) data lockout
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following is not a common form of conceptual database model?

A) hierarchical
B) network
C) sequential
D) relational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
47
The advantages of a partitioned database include all of the following except

A) user control is enhanced
B) data transmission volume is increased
C) response time is improved
D) risk of destruction of entire database is reduced
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
48
Data concurrency

A) is a security issue in partitioned databases
B) is implemented using timestamping
C) may result in data lockout
D) occurs when a deadlock is triggered
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
49
In the relational database model

A) relationships are explicit
B) the user perceives that files are linked using pointers
C) data is represented on two-dimensional tables
D) data is represented as a tree structure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following is a level of the database that is defined by the data definition language?

A) user view
B) schema
C) internal view
D) all are levels or views of the database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
51
An example of a distributed database is

A) partitioned database
B) centralized database
C) networked database
D) all are examples of distributed databases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
52
When creating and controlling backups for a sequential batch system,

A) the number of backup versions retained depends on the amount of data in the file
B) off-site backups are not required
C) backup files can never be used for scratch files
D) the more significant the data, the greater the number of backup versions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
53
A replicated database is appropriate when

A) there is minimal data sharing among information processing units
B) there exists a high degree of data sharing and no primary user
C) there is no risk of the deadlock phenomenon
D) most data sharing consists of read-write transactions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
54
In a direct access file system

A) backups are created using the grandfather-father-son approach
B) processing a transaction file against a maser file creates a backup file
C) files are backed up immediately before an update run
D) if the master file is destroyed, it cannot be reconstructed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
55
All of the following are elements of the DBMS which facilitate user access to the database except

A) query language
B) data access language
C) data manipulation language
D) data definition language
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
56
All of the following are advantages of a partitioned database except

A) increased user control by having the data stored locally
B) deadlocks are eliminated
C) transaction processing response time is improved
D) partitioning can reduce losses in case of disaster
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which backup technique is most appropriate for sequential batch systems?

A) grandparent-parent-child approach
B) staggered backup approach
C) direct backup
D) remote site, intermittent backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
58
In a relational database

A) the user's view of the physical database is the same as the physical database
B) users perceive that they are manipulating a single table
C) a virtual table exists in the form of rows and columns of a table stored on the disk
D) a programming language (COBOL) is used to create a user's view of the database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following is not an access control in a database system?

A) antivirus software
B) database authorization table
C) passwords
D) voice prints
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which statement is false?

A) The DBMS is special software that is programmed to know which data elements each user is authorized to access.
B) User programs send requests for data to the DBMS.
C) During processing, the DBMS periodically makes backup copies of the physical database.
D) The DBMS does not control access to the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
61
What are two types of distributed databases?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
62
What is the partitioned database approach and what are its advantages?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
63
Describe two tests of controls that would provide evidence that the database management system is protected against unauthorized access attempts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
64
Describe an environment in which a firm should use a partitioned database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
65
Use the following words to complete the sentences in questions 1 through 5.
Use the following words to complete the sentences in questions 1 through 5.   The __________________________ authorizes access to the database.
The __________________________ authorizes access to the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
66
What is a database authorization table?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
67
Why are the hierarchical and network models called navigational databases?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
68
Use the following words to complete the sentences in questions 1 through 5.
Use the following words to complete the sentences in questions 1 through 5.   The ____________________ allows users to retrieve and modify data easily.
The ____________________ allows users to retrieve and modify data easily.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
69
Which of the following is not a basic database backup and recovery feature?

A) checkpoint
B) backup database
C) transaction log
D) database authority table
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
70
Use the following words to complete the sentences in questions 1 through 5.
Use the following words to complete the sentences in questions 1 through 5.   _________________________ occurs when a specific file is reproduced for each user who needs access to the file.
_________________________ occurs when a specific file is reproduced for each user who needs access to the file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
71
Use the following words to complete the sentences in questions 1 through 5.
Use the following words to complete the sentences in questions 1 through 5.   The conceptual view of the database is often called ____________________.
The conceptual view of the database is often called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
72
What is a legacy system?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following is not a test of access controls?

A) biometric controls
B) encryption controls
C) backup controls
D) inference controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
74
What is a replicated database and what are the advantages of this approach?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
75
What is a database lockout?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
76
Audit objectives for the database management system include all of the following except

A) verifying that the security group monitors and reports on fault tolerance violations
B) confirming that backup procedures are adequate
C) ensuring that authorized users access only those files they need to perform their duties
D) verifying that unauthorized users cannot access data files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
77
Use the following words to complete the sentences in questions 1 through 5.
Use the following words to complete the sentences in questions 1 through 5.   The __________________________ describes every data element in the database.
The __________________________ describes every data element in the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
78
All of the following tests of controls will provide evidence that access to the data files is limited except

A) inspecting biometric controls
B) reconciling program version numbers
C) comparing job descriptions with access privileges stored in the authority table
D) attempting to retrieve unauthorized data via inference queries
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
79
The database attributes that individual users have permission to access are defined in

A) operating system.
B) user manual.
C) database schema.
D) user view.
E) application listing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
80
How does the database approach solve the problem of data redundancy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 101 في هذه المجموعة.