Deck 15: Database Administration and Security

ملء الشاشة (f)
exit full mode
سؤال
Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity.
سؤال
The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.
سؤال
Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database.
سؤال
A full backup, or database dump, produces a complete copy of the entire database.
سؤال
The security, privacy, and integrity of data in a database are of minimal concern to DBAs who manage current DBMS installations.
سؤال
System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
سؤال
When an organization employs both a DA and a DBA, the DA's job has a technical orientation, whereas the DBA's job has a managerial orientation.
سؤال
An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.
سؤال
The DBMS must provide tools that give each level of management a useful view of the data and support the required level of decision-making.
سؤال
The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization.
سؤال
The storage locations for multiple backups must include sites inside and outside the organization.
سؤال
The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department.
سؤال
Incremental backups produce a backup of all data.
سؤال
The DBA must supervise the installation of all software and hardware designated to support the data administration strategy.
سؤال
Testing procedures and standards must already be in place before any application program can be approved for use in the company.
سؤال
The DBA interacts with the end user by providing data and information support services to the organization's departments.
سؤال
The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
سؤال
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
سؤال
Concurrent backups take place while the user is working on the database.
سؤال
A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
سؤال
When performing user access management, a DBA assigns passwords to each user at both the operating system and DBMS levels.
سؤال
are general statements of direction or action that communicate and support DBA goals.

A) Standards
B) Policies
C) Guidelines
D) Procedures
سؤال
In the context of database security measures, enforcing complex password policies will address the security vulnerabilities of the operating system component.
سؤال
Protecting the security and integrity of a database is a function of authorization management.
سؤال
The person responsible for the control of the centralized and shared database is the database .

A) analyst
B) administrator
C) programmer
D) user
سؤال
Database administration operations are commonly defined and divided according to the phases of the .

A) SLA
B) DBLC
C) SDLC
D) MRA
سؤال
The role of a DBA covers activities that involve evaluating, selecting, installing, and maintaining a DBMS and its related utilities and applications.

A) technical
B) administrative
C) managerial
D) interactive
سؤال
The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.
سؤال
When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) impact of the new database system.

A) cultural
B) managerial
C) technical
D) operational
سؤال
A data administrator is also known as a(n) .

A) data security officer
B) systems administrator
C) information resource manager
D) information engineering officer
سؤال
The maintenance activities of the DBA are an extension of the operational activities.
سؤال
Coordinating, monitoring, and allocating database administration resources is included in a DBA's role.

A) operative
B) arbitration
C) technical
D) managerial
سؤال
At the level of middle management, the database must be able to .

A) provide a framework for defining and enforcing organizational policies
B) provide the data necessary for tactical decisions and planning
C) provide feedback to monitor whether a company is achieving its goals
D) provide access to external and internal data to identify growth opportunities
سؤال
Security breaches can yield a database whose integrity is either preserved or corrupted.
سؤال
The administrator is responsible for strategic planning.

A) system
B) data
C) database
D) program
سؤال
A passive data dictionary is one that is updated automatically with every database access to keep its access information up to date.
سؤال
are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.

A) Guidelines
B) Standards
C) Procedures
D) Documentations
سؤال
Training people to use the DBMS and its tools is not included in the responsibilities of a DBA.
سؤال
In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions in an organization's:

A) lower levels.
B) top levels.
C) target markets.
D) customer base.
سؤال
A(n) plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time.

A) access
B) completion
C) application
D) communications
سؤال
_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.

A) Backup and recovery
B) System support
C) Performance monitoring and tuning
D) Security auditing and monitoring
سؤال
"All users must have passwords" is an example of a .

A) rule
B) policy
C) standard
D) procedure
سؤال
In the context of developing a data administration strategy, a(n) provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools.

A) access plan
B) active data dictionary
C) information systems architecture
D) security policy
سؤال
are written instructions that describe a series of steps to be followed during the performance of a given activity.

A) Policies
B) Standards
C) Guidelines
D) Procedures
سؤال
security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

A) Debilitative
B) Preserving
C) Corrupting
D) Destructive
سؤال
allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.

A) Access Management
B) Business Intelligence
C) Information engineering (IE)
D) MOLAP
سؤال
In the context of database usage monitoring, a(n) is a file that automatically records a brief description of the database operations performed by all users.

A) change tracker
B) digital footprint
C) paper trail
D) audit log
سؤال
When performing user access management, a DBA defines each user to the database at the levels.

A) application and DBMS
B) operating system and DBMS
C) operating system and application
D) application and network
سؤال
A(n) data dictionary is automatically updated by the DBMS with every database access.

A) dynamic
B) active
C) passive
D) static
سؤال
Which of the following is a reason why a DBMS's daily operations must be clearly documented?

A) Documentation of the daily operations help a company set its long-term goals.
B) Documentation of the daily operations help manage the manual data resources of a company.
C) Documentation of the daily operations help pinpoint causes and solutions of database problems.
D) Documentation of the daily operations help free the DBA from many lower-level technology-oriented tasks.
سؤال
The component of a CASE tool produces the information system's input/output formats.

A) analysis
B) graphics
C) program document generator
D) screen painter and report generator
سؤال
In the context of data backup and recovery, the activities of a includes the DBA operations that are classified as disaster management.

A) database programmer
B) systems analyst
C) data administrator
D) database security officer
سؤال
_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

A) Integrity
B) Compliance
C) Availability
D) Confidentiality
سؤال
"A password must have a minimum of five characters" is an example of a .

A) policy
B) rule
C) procedure
D) standard
سؤال
A(n) data dictionary is not updated automatically and usually requires a batch process to be run.

A) active
B) passive
C) static
D) dynamic
سؤال
Instructions to create a password are an example of a .

A) rule
B) policy
C) standard
D) procedure
سؤال
User-access management is a subset of .

A) password protection
B) authorization management
C) data integrity management
D) managerial control
سؤال
CASE tools provide support for the planning, analysis, and design phases.

A) Front-end
B) Back-end
C) Vertical
D) Horizontal
سؤال
CASE tools provide support for the coding and implementation phases.

A) Front-end
B) Back-end
C) Vertical
D) Horizontal
سؤال
In the context of ensuring integrity of a database, a(n) transaction is one that does not overload the DBMS.
سؤال
The DBA must review the database application design to ensure that transactions are , meaning that they mirror real-world events.
سؤال
The requirement that a password must have a maximum of 12 characters is an example of a(n) .
سؤال
Based on the type of decision-making support required, database users may be classified into: operational, tactical, or _____.
سؤال
In the context of data quality management tools, software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.
سؤال
In the context of database administration, is the extent to which individuals and organizations have the right to determine the "who, what, when, where, and how" of data usage.
سؤال
In the context of the Oracle Enterprise Manager, a(n) is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.

A) license
B) role
C) profile
D) quota
سؤال
In the context of the advancements in DBMS technology, the use of data services can free the DBA from many lower-level technology-oriented tasks.
سؤال
A security is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
سؤال
The , also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap.
سؤال
The DSO's activities are often classified as management, which includes all DBA activities designed to ensure data availability following a physical calamity or a database integrity failure.
سؤال
Within the data security framework, is concerned with keeping data consistent and free of errors or anomalies.
سؤال
In the context of an organization's managerial structure, decisions are short term and affect only daily operations; for example, deciding to change the price of a product to clear it from inventory.
سؤال
One of the important functions provided by the database is to reserve the resources that must be used by the database at run time.

A) security component
B) authorization manager
C) initialization parameters
D) administrator
سؤال
A(n) is a logical storage area in Oracle.

A) audit log
B) datafile
C) schema
D) tablespace
سؤال
The aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization.
سؤال
In the context of the Oracle Enterprise Manager, a is a named collection of settings that control how much of the database resource a given user can use.

A) license
B) role
C) profile
D) constraint
سؤال
In case a company installs several incompatible databases and assigns a DBA for each of them, the general coordinator of all such DBAs is known as the administrator.
سؤال
In the context of the Oracle Enterprise Manager, a(n) is a uniquely identifiable object that allows a given person to log on to the database.

A) user
B) role
C) profile
D) client
سؤال
Performance monitoring and activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/86
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Database Administration and Security
1
Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure.
False
2
In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity.
False
3
The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.
True
4
Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
5
A full backup, or database dump, produces a complete copy of the entire database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
6
The security, privacy, and integrity of data in a database are of minimal concern to DBAs who manage current DBMS installations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
7
System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
8
When an organization employs both a DA and a DBA, the DA's job has a technical orientation, whereas the DBA's job has a managerial orientation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
9
An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
10
The DBMS must provide tools that give each level of management a useful view of the data and support the required level of decision-making.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
11
The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
12
The storage locations for multiple backups must include sites inside and outside the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
13
The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
14
Incremental backups produce a backup of all data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
15
The DBA must supervise the installation of all software and hardware designated to support the data administration strategy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
16
Testing procedures and standards must already be in place before any application program can be approved for use in the company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
17
The DBA interacts with the end user by providing data and information support services to the organization's departments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
18
The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
19
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
20
Concurrent backups take place while the user is working on the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
21
A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
22
When performing user access management, a DBA assigns passwords to each user at both the operating system and DBMS levels.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
23
are general statements of direction or action that communicate and support DBA goals.

A) Standards
B) Policies
C) Guidelines
D) Procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
24
In the context of database security measures, enforcing complex password policies will address the security vulnerabilities of the operating system component.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
25
Protecting the security and integrity of a database is a function of authorization management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
26
The person responsible for the control of the centralized and shared database is the database .

A) analyst
B) administrator
C) programmer
D) user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
27
Database administration operations are commonly defined and divided according to the phases of the .

A) SLA
B) DBLC
C) SDLC
D) MRA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
28
The role of a DBA covers activities that involve evaluating, selecting, installing, and maintaining a DBMS and its related utilities and applications.

A) technical
B) administrative
C) managerial
D) interactive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
29
The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
30
When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) impact of the new database system.

A) cultural
B) managerial
C) technical
D) operational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
31
A data administrator is also known as a(n) .

A) data security officer
B) systems administrator
C) information resource manager
D) information engineering officer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
32
The maintenance activities of the DBA are an extension of the operational activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
33
Coordinating, monitoring, and allocating database administration resources is included in a DBA's role.

A) operative
B) arbitration
C) technical
D) managerial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
34
At the level of middle management, the database must be able to .

A) provide a framework for defining and enforcing organizational policies
B) provide the data necessary for tactical decisions and planning
C) provide feedback to monitor whether a company is achieving its goals
D) provide access to external and internal data to identify growth opportunities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
35
Security breaches can yield a database whose integrity is either preserved or corrupted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
36
The administrator is responsible for strategic planning.

A) system
B) data
C) database
D) program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
37
A passive data dictionary is one that is updated automatically with every database access to keep its access information up to date.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
38
are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.

A) Guidelines
B) Standards
C) Procedures
D) Documentations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
39
Training people to use the DBMS and its tools is not included in the responsibilities of a DBA.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
40
In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions in an organization's:

A) lower levels.
B) top levels.
C) target markets.
D) customer base.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
41
A(n) plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time.

A) access
B) completion
C) application
D) communications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
42
_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.

A) Backup and recovery
B) System support
C) Performance monitoring and tuning
D) Security auditing and monitoring
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
43
"All users must have passwords" is an example of a .

A) rule
B) policy
C) standard
D) procedure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
44
In the context of developing a data administration strategy, a(n) provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools.

A) access plan
B) active data dictionary
C) information systems architecture
D) security policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
45
are written instructions that describe a series of steps to be followed during the performance of a given activity.

A) Policies
B) Standards
C) Guidelines
D) Procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
46
security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

A) Debilitative
B) Preserving
C) Corrupting
D) Destructive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
47
allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.

A) Access Management
B) Business Intelligence
C) Information engineering (IE)
D) MOLAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
48
In the context of database usage monitoring, a(n) is a file that automatically records a brief description of the database operations performed by all users.

A) change tracker
B) digital footprint
C) paper trail
D) audit log
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
49
When performing user access management, a DBA defines each user to the database at the levels.

A) application and DBMS
B) operating system and DBMS
C) operating system and application
D) application and network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
50
A(n) data dictionary is automatically updated by the DBMS with every database access.

A) dynamic
B) active
C) passive
D) static
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which of the following is a reason why a DBMS's daily operations must be clearly documented?

A) Documentation of the daily operations help a company set its long-term goals.
B) Documentation of the daily operations help manage the manual data resources of a company.
C) Documentation of the daily operations help pinpoint causes and solutions of database problems.
D) Documentation of the daily operations help free the DBA from many lower-level technology-oriented tasks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
52
The component of a CASE tool produces the information system's input/output formats.

A) analysis
B) graphics
C) program document generator
D) screen painter and report generator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
53
In the context of data backup and recovery, the activities of a includes the DBA operations that are classified as disaster management.

A) database programmer
B) systems analyst
C) data administrator
D) database security officer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
54
_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

A) Integrity
B) Compliance
C) Availability
D) Confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
55
"A password must have a minimum of five characters" is an example of a .

A) policy
B) rule
C) procedure
D) standard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
56
A(n) data dictionary is not updated automatically and usually requires a batch process to be run.

A) active
B) passive
C) static
D) dynamic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
57
Instructions to create a password are an example of a .

A) rule
B) policy
C) standard
D) procedure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
58
User-access management is a subset of .

A) password protection
B) authorization management
C) data integrity management
D) managerial control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
59
CASE tools provide support for the planning, analysis, and design phases.

A) Front-end
B) Back-end
C) Vertical
D) Horizontal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
60
CASE tools provide support for the coding and implementation phases.

A) Front-end
B) Back-end
C) Vertical
D) Horizontal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
61
In the context of ensuring integrity of a database, a(n) transaction is one that does not overload the DBMS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
62
The DBA must review the database application design to ensure that transactions are , meaning that they mirror real-world events.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
63
The requirement that a password must have a maximum of 12 characters is an example of a(n) .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
64
Based on the type of decision-making support required, database users may be classified into: operational, tactical, or _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
65
In the context of data quality management tools, software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
66
In the context of database administration, is the extent to which individuals and organizations have the right to determine the "who, what, when, where, and how" of data usage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
67
In the context of the Oracle Enterprise Manager, a(n) is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.

A) license
B) role
C) profile
D) quota
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
68
In the context of the advancements in DBMS technology, the use of data services can free the DBA from many lower-level technology-oriented tasks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
69
A security is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
70
The , also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
71
The DSO's activities are often classified as management, which includes all DBA activities designed to ensure data availability following a physical calamity or a database integrity failure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
72
Within the data security framework, is concerned with keeping data consistent and free of errors or anomalies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
73
In the context of an organization's managerial structure, decisions are short term and affect only daily operations; for example, deciding to change the price of a product to clear it from inventory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
74
One of the important functions provided by the database is to reserve the resources that must be used by the database at run time.

A) security component
B) authorization manager
C) initialization parameters
D) administrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
75
A(n) is a logical storage area in Oracle.

A) audit log
B) datafile
C) schema
D) tablespace
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
76
The aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
77
In the context of the Oracle Enterprise Manager, a is a named collection of settings that control how much of the database resource a given user can use.

A) license
B) role
C) profile
D) constraint
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
78
In case a company installs several incompatible databases and assigns a DBA for each of them, the general coordinator of all such DBAs is known as the administrator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
79
In the context of the Oracle Enterprise Manager, a(n) is a uniquely identifiable object that allows a given person to log on to the database.

A) user
B) role
C) profile
D) client
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
80
Performance monitoring and activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.