Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask DBMS Expert


Home >> DBMS

A ____________ is a disconnected, memory-resident representation of the database which contains tables, columns, rows, relationships, and constraints.

a. DataSymbol

b. DataObject

c. DataMart

d. DataSet

_______ is an object-oriented programming language developed by Sun Microsystems that runs on top of Web browser software.

a. ActiveX

b. Python

c. Java

d. JavaScript

____________ is rapidly becoming the data exchange standard for e-commerce applications; it is important because it provides the semantics that facilitate the sharing, exchange, and manipulation of structured documents over organizational boundaries.

a. Semantic Markup Language (SML)

b. Unified Markup Language (UML)

c. Extensible Markup Language (XML)

d. PML (Programming Markup Language (PML)

________ the objects that manage the connection with a data source and provide data to the consumers.

a. Providers

b. Servers

c. Consumers

d. Producers

An _____________ document is an advanced data definition language that is used to describe the structure (elements, data types, relationship types, ranges, and default values) of XML data documents.

a. Unified Markup Language (UML)

b. Extensible Markup Language (XML)

c. Semantic Markup Language (SML)

d. XML Schema Definition (XSD)

Which of the following is NOT a common feature of a web application server?

a. Security and authentication of users

b. Database access with transaction management

c. Performance and fault tolerance

d. All of these choices are correct.

To define a ______________ you must create a data source name (DSN) for the data source.

a. data source

b. detailed data source

c. named space

d. remote data space

A __________ is an external application that is automatically invoked by the browser when needed.

a. plug-in

b. program

c. preference

d. app

Which of the following is NOT a database connectivity option?

a. Native SQL connectivity

b. ODBC, DAO, RDO

c. ABC.NET

d. OLE-DB

Which of the following is a type of cloud computing implementation?

a. Private cloud

b. Public cloud

c. Community cloud

d. All of these choices are correct.

___________________ refers to the mechanisms through which application programs interact and communicate with data repositories.

a. Database connectivity

b. Database management

c. Database development

d. Database schema

A _________ is a series of instructions executed in interpreter mode; it is a plain text file that is not compiled like COBOL, C++, or Java.

a. script

b. processor

c. module

d. function

Microsoft developed _________to answer the need for non-relational data access and to simplify data connectivity.

a. DEO

b. ODBC

c. OLE-DB

d. RDO

_______ was the first piece of Microsoft's strategy to provide a unified object-oriented framework for the development of next-generation applications.

a. ODBC

b. RDO

c. OLE-DB

d. DEO

Which of the following is a well-defined web server interface used frequently today?

a. Constant interfaces (CI)

b. Artificial interfaces (AI)

c. Common gateway interfaces (CGI)

d. None of these choices are correct.

______________is "a computing model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computer resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction."

a. Cloud computing

b. Cloud servicing

c. Cloud networking

d. Cloud programming

_____________ is a file that describes XML elements-it provides the composition of the database's logical model, and defines the syntax rules or valid tags for each type of XML document.

a. Extensible Markup Language (XML)

b. Semantic Markup Language (SML)

c. Unified Markup Language (UML)

d. Document Type Definition (DTD)

Which of the following is/are the basic components of the ODBC architecture?

a. A Driver Manager

b. An ODBC Driver

c. A high level ODBC API

d. All of these choices are correct.

Once the DataSet is populated, it is completely independent of the data source - that's why it's called "_________".

a. disjoint

b. apportioned

c. independent

d. disconnected

Which of the following is NOT one of the most prevalent characteristics of cloud computing services?

a. Higher cost and standard pricing

b. Service orientation

c. Managed operations

d. All of these choices are correct.

Which of the following is considered an advantage of SQL data services?

a. Dynamic and automatic load balancing

b. Automated backup and disaster recovery

c. High level of failure tolerance

d. All of these choices are correct.

Which of the following has the potential to turn basic IT services into "commodity" services such as electricity, gas, and water, and to enable a revolution that could change not only the way that companies do business, but the IT business itself?

a. Cloud services

b. DataMart systems

c. Distributed database systems

d. Cybersecurity services

Which of the following is a type of cloud service that offers turnkey applications that run in the cloud?

a. PaaS

b. IaaS

c. SaaS

d. None of these choices are correct.

Which of the following is NOT considered a main advantage of cloud computing services?

a. Low initial cost of entry

b. Complex licensing schemes

c. High reliability and performance

d. Fast provisioning

Which of the following is required to create an ODBC data source name?

a. ODBC driver

b. ODBC driver parameters

c. A DSN name

d. All of these choices are correct.

__________________ is an application programming interface that allows a Java program to interact with a wide range of data sources (relational databases, tabular data sources, spreadsheets, and text files).

a. Java Database Connectivity (JDBC)

b. Unified Markup Language (UML)

c. Semantic Markup Language (SML)

d. Document Type Definition (DTD)

___________ is a meta-language used to represent and manipulate data elements.

a. Semantic Markup Language (SML)

b. Extensible Markup Language (XML)

c. PML (Programming Markup Language (PML)

d. Unified Markup Language (UML)

____________________ are used to extend the functionality of the web server to provide more services and to provide support for access to external databases, fax services, telephony services, directory services, etc.

a. Server users

b. Web server interfaces

c. Server programs

d. Web server associations

______ provides an optimized interface that exposed the functionality of the Jet data engine (on which MS Access database if based on) to programmers.

a. REO

b. DAO

c. OLE-DC

d. ODBC

The OLE-DB model is based on which of the two types of objects?

a. consumers, providers

b. clients, servers

c. consumers, producers

d. clients, users

Which of the following is NOT considered a disadvantage of cloud computing services?

a. Issues of security, privacy, and compliances

b. Low initial cost of entry

c. Loss of ownership and control

d. Complex licensing schemes

A ______________ is a middleware application that expands the functionality of servers by linking them to a wide range of services such as databases, directory systems, and search engines.

a. web dominant server

b. client application server

c. web application server

d. plug-in server

_______________is "a computing model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computer resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction."

a. Cloud computing

b. Cloud networking

c. Cloud programming

d. Cloud servicing

____ allows any Windows application to access relational data sources using SQL via a standard application programming interface (API).

a. OLE-DC

b. RAO

c. ODBC

d. REO

The web is a(n) ________________ in that at any given time, a web server does not know the status of any of the clients communicating with it.

a. stateless system

b. simple configuration

c. dormant medium

d. inactive status

To provide such support for scripting languages, especially the ones used for web development, such as Active Server Pages (ASP) and ActiveX, Microsoft developed a new object framework called _______________.

a. ActiveX Data Objects (ADO)

b. Remote Data Objects (RDO)Servers

c. Object Linking and Embedding for Database (OLE-DB)

d. Data Access Objects (DAO)

_______________ refers to Internet-based data management services that provide access to hosted relational data management using standard protocols and common programming interfaces.

a. Cloud data services

b. SQL data services

c. Database services

d. DataMart data services

_______________ scripts contain the code that is required to connect, query, and update a database from a Web front end.

a. ColdFusion

b. Microsoft

c. Java

d. File Manager

______ uses the lower-level DAO and ODBC for direct access to databases.

a. OLE-DC

b. ODBC

c. RDO

d. DEO

Using the tags and words on the right, complete the XML document below. The "Customers" tag contains zero or more "Customer" children and the "Customer" tag may contain all of the remaining tags as children.

_____ are raw facts of interest to an end user. Examples include a person's date of birth, an employee name, the number of pencils in stock, etc.

a. Knowledge

b. Statistics

c. Data

d. Information

Which of the following is NOT a benefit of a CASE tool?

a. Increase in development time and costs

b. Easier maintenance of application systems

c. Automation of the SDLC

d. Standardization of system development methodologies

____________ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve

those goals.

a. CASE tools

b. Database Management

c. User Planning

d. Information Engineering

_________ refers to activities and measures that ensures the confidentiality, integrity, and availability of an information system and its main asset, data.

a. Performance

b. Maintenance

c. Security

d. Design

____________ refers to activities and measures that ensures the confidentiality, integrity, and availability of an information system and its main asset, data.

a. Performance

b. Maintenance

c. Security

d. Design

Which of the following is an example of data dictionary usage using SQL statements?

a. List the names of the columns for all tables created by JONESVI in the current database

b. List the user and table names for all users who can alter the database structure for any table in the database

c. List the names and creation dates of all tables created by the user JONESVI in the current database

d. All of these choices are correct.

Which of the following is NOT a desired managerial characteristic or skill for a DBA?

a. Conflict resolution skills

b. Analytical skills

c. Negotiation skills

d. Knowledge of database life cycle

Which of the following is NOT a source of dirty data?

a. Typographical errors

b. Nonstandard abbreviations

c. Use of synonyms across systems

d. Enforcement of integrity constraints

The DBA works with application programmers to ensure the quality and integrity of database design and transactions by ensuring that transactions are:

a. variable and static.

b. small, linear, and isolated.

c. correct, efficient, and compliant.

d. All of these choices are correct.

A(n) ________________ automatically records a brief description of database operations performed by all users.

a. audit log

b. usage table

c. data dictionary

d. security manual

Which of the following is NOT a desired technical characteristic or skill for a DBA?

a. Negotiation skills

b. Database modeling and design

c. Structured methodologies

d. Knowledge of database life cycle

Which of the following is NOT an area that a DBA must define, communicate and enforce procedures for?

a. Providing end-user training

b. Establishing backup and recovery for databases

c. Finding new customers

d. Finding new database software

Which of the following is NOT an activity of characteristic of a DBA?

a. is DBMS-specific

b. has a tactical orientation

c. focuses on the long term

d. controls and supervises

Which of the following DBA activities are used to support end users?

a. Resolving conflicts and problems

b. Finding solution to information needs

c. Ensuring quality and integrity of data and applications

d. All of these choices are correct.

Which of the following is considered the two most important assets of any organization?

a. Users and costs

b. Money and power

c. Customers and goals

d. People and data

Some of the common features of a data dictionary include:

a. end users and administrators of the database.

b. relationships among data elements.

c. tables defined in all databases.

d. All of these choices are correct

The technical aspects of the DBA's job are rooted in which of the following areas of operation?

a. training and supporting users

b. evaluating, selecting, and installing the DBMS and related utilities

c. testing and evaluating databases and applications

d. All of these choices are correct.

The backup and recovery measures must include which of the following?

a. convenient and safe backup storage.

b. physical protection of both hardware and software.

c. periodic data and application backups.

d. All of these choices are correct.

Which of the following is NOT considered one of the DBA's responsibilities?

a. Responsible for managing the overall corporate data resource, both computerized and non-computerized

b. Position requires both managerial and technical skills

c. Control and management of the shared database within an organization

d. All of these choices are part of the DBA's responsibilities.

Which of the following is NOT a role the DBMS facilitates?

a. Distribution of data and information

b. Interpretation and presentation of data

c. Data preservation and monitoring data usage

d. All of these choices are correct.

_________ is a comprehensive approach to ensuring the accuracy, validity, and timeliness of the data.

a. Data construction

b. Data quality

c. Data statistics

d. Dirty data

Which of the following is NOT an activity of characteristic of a DA?

a. has a tactical orientation

b. focuses on the long term

c. performs strategic planning

d. is DBMS-independent

Which of the following must happen when a corrupting security breach occurs?

a. The entire database must be removed

b. The database must be recovered to a consistent state

c. The users must be notified

d. The business must immediately shutdown all operations

______________ is data that contains inaccuracies or inconsistencies (i.e. data that lacks integrity) and may result from a lack of enforcement of integrity constraints, typographical errors, the use of synonyms and homonyms across systems, the use of nonstandard abbreviations, or differences in the decomposition of composite attributes.

a. Dirty data

b. Knowledge

c. Data

d. Statistics

A _______________ is a named collection of database access privileges that authorize a user to connect to the database and use its system resources.

a. role

b. dataspace

c. user

d. instance

A _____________ tool provides an automated framework for the systems development life cycle (SDLC) and is classified according to the extent of support it provides for the SDLC.

a. user

b. CASE

c. audit

d. management

As a DBA, what data dimensions would you describe to top-level managers to obtain their support for endorsing the data administration function?

a. identify and define the need for and role of the DBMS in the organization

b. emphasize the importance of data as a company asset, to be managed as any other asset

c. the need to illustrate and explain the impact of a DBMS in an organization

d. All of these choices are correct.

Which of the following special considerations must you take into account when introducing a DBMS into an organization?

a. Expect some resistance to change

b. How to deal with resistance to change

c. Retraining requirements for the new system

d. All of these choices are correct.

Database performance will naturally __________ as the database grows and more users access it.

a. increase

b. stabilize

c. change

d. decrease

________are general statements of direction or action that communicate and support DBA goals. Examples include: all users must have passwords or passwords must be changed every six months.

a. Policies

b. Standards

c. Documents

d. Procedures

Which of the following cloud related features should be included on a DBA's checklist of desired DBMS features?

a. Downtime history

b. Data loss contingencies

c. Security

d. All of these choices are correct.

Which of the following statements best explains the role of databases in organizations?

a. The database's predominant role is to support client information at all levels in the organization.

b. The database's predominant role is to support user transactions at all levels in the organization.

c. The database's predominant role is to support managerial decision making at all levels in the organization.

d. None of these choices are correct.

A database _________ is a logical section of the database that belongs to a given user and is identified by the username.

a. datafile

b. role

c. schema

d. user

The ________________ is responsible for controlling the overall corporate data resources, both computerized and manual.

a. database administrator (DBA)

b. security administrator (SA)

c. data administrator (DA)

d. database manager (DM)

Which of the following should NOT be included on a DBA's checklist of desired DBMS features?

a. Portability and standards

b. Security and integrity

c. Application development support

d. Employment contracts

A ________________ is a collection of standards, policies, and procedures created to guarantee the security of a system and ensure auditing and compliance.

a. security policy

b. security standard

c. security officer

d. security portfolio

A _______________ physically stores the database's data and is associated with only one tablespace but can reside in a different directory on the hard disk or on multiple hard disks.

a. datafile

b. role

c. user

d. instance

________are written instructions that describe a series of steps to be followed during the performance of a given activity. They must be developed within existing working conditions, and they must support and enhance the working environment.

a. Procedures

b. Standards

c. Documents

d. Policies

Which of the following is a reason why data quality is important?

a. Without it accurate and timely information cannot be produced

b. Without it, organizations can fail in their competitive environments

c. Without it, it is difficult to make good decisions

d. All of these choices are correct.

Which of the following is NOT a level of data confidentiality?

a. Confidential

b. Open source

c. Highly restricted

d. Unrestricted

Which parts of the system does the evaluation process cover?

a. Documentation and procedures

b. Applications only

c. Documentation only

d. Procedures only

A _____________ is a DBMS component that stores the definition of data characteristics and relationships.

a. security manual

b. data dictionary

c. usage table

d. audit log

Which of the following is a desired characteristic or skill for a DBA?

a. Knowledge of database life cycle

b. Conflict resolution skills

c. Analytical skills

d. All of these choices are correct.

_______describe the minimum requirements of a given DBA activity; they are more detailed and specific than policies and are rules that evaluate the quality of the activity. Examples include: a password must have a minimum of 5 characters and a password must have a maximum of 12 characters.

a. Policies

b. Standards

c. Procedures

d. Documents

A _______________ is a logical storage space that is used primarily to group related data logically.

a. tablespace

b. dataspace

c. datafile

d. instance

Cloud services provide which of the following?

a. DBMS installation and updates.

b. server and network management.

c. backup and recovery operations.

d. All of these choices are correct.

DBMS operations can be divided into which of the following four main areas?

a. daily operations, running programs, hardware status, emergency power sources

b. system support, performance monitoring and tuning, backup and recovery, and security auditing and monitoring

c. query optimization, database recovery, backup frequency, and establishing primary and secondary memory

d. establish DBMS performance goals, monitor the DBMS, isolate problems, implement performance solutions

A _______________ is a separate location in memory that is reserved to run your database.

a. database slice

b. database section

c. database instance

d. database role

Security vulnerabilities can fall under which of the following categories?

a. managerial

b. technical

c. procedural

d. All of these choices are correct.

___________ is processed data or the product of applying some analytical process to data.

a. Data

b. Statistics

c. Information

d. Knowledge

Which of the following is NOT one of the characteristics of the DBMS approach over the file-system approach?

a. A file system uses a "shared-ownership" approach while a DBMS uses a "single-ownership" approach

b. The change from DP to MIS shifts data management from an operational level to a tactical or strategic level

c. A change in focus or function when the shift from file system to the DBMS occurs

d. None of these choices are correct.

__________ deals with the rights of people and organizations to determine who accesses the data and when, where, and how the data are to be used.

a. Integrity

b. Quality

c. Privacy

d. Security

___________________ defines procedures to protect and guarantee database security and integrity and includes user access management, view definition, DBMS access control, and DBMS usage monitoring.

a. Authorization management

b. Access management

c. User management

d. Usage management

The DBA has a(n) ___________ role in installing and maintain the BMS that is in a cloud-based environment.

a. decreased

b. isolated

c. increased

d. non-existent

___________ means protecting the data against accidental or intentional use by unauthorized users.

a. Quality

b. Integrity

c. Privacy

d. Security

________ within the data security framework is concerned with keeping data consistent and free of errors or anomalies.

a. Confidentiality

b. Integrity

c. Security

d. Compliance

Match the roles with the role's description:

Data Administrator (DA) - This person may access the database depending upon business requirements.

Information Resource Manager - Thus person's sole job is to ensure database security and integrity. In large organizations.

Database Security Officer (DSO) - This person is the general coordinator of all DBAs.

Systems Administrator - In may organizations the Data Administrator is known by this title.

Database Administrator (DBA) - This person usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA.

User - The person responsible for control of the centralized and shared database.

Identify each of the following as either "A - data security" risks or "B - database security" risks.

1. Weak user password

2. Computer screen visible to unauthorized individuals

3. User copies data to a USB drive

4. Unauthorized PC access

5. Virus on user PC

6. Phishing or Spamming

7. Open data shares

8. Lack of proper backup

DBMS, Programming

  • Category:- DBMS
  • Reference No.:- M92385819
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question?


Related Questions in DBMS

Relational database exerciseyou have been assigned to a new

Relational Database Exercise: You have been assigned to a new development team. A client is requesting a relational database system to manage their present store with the anticipation of adding more stores in the future. ...

Select from e d pwhere edeptddept and dcitypcity and

Select * From E, D, P WHERE E.dept=D.dept AND D.city=P.city AND D.budget>1M AND P.priority=A; Assuming relations have the same size and uniform distributions, what is the best plan with Nested Loop joins only? Write it a ...

Project outline and requirements provide a brief

Project Outline and Requirements Provide a brief description of the organization (can be hypothetical) that will be used as the basis for the projects in the course. Include company size, location(s), and other pertinent ...

You can work on this assignment individually or in a group

You can work on this assignment individually or in a group of 2. If you are working in a group please establish a group in Assignment 2 Group on Canvas In this assignment you are asked to explore the use of neural networ ...

Database and information retrieval assignment - data

Database and Information Retrieval Assignment - Data Privacy Essay Task - Write an essay (aim for 750 words) that addresses issues associated with data proivacy. Use the Australian Privacy Principles - discussed in class ...

Assignment question - write and run sql statements to

Assignment Question - Write and run SQL statements to complete the following tasks Part A - DML 1. Locate the record in the vendor table that does not have a value for the attribute V_STATE 2. Find the customers whose ba ...

Sqlwrite a select statement that returns one column from

SQL Write a SELECT statement that returns one column from the Vendor table named Full Name. Create this column from the VendorContactFName and VendorContactLName columns. Format it as follows: last name, comma, first nam ...

Assignmentqueries functions and triggersdatabase

Assignment Queries, Functions and Triggers Database Systems Aims The aims of this assignment are to: formulate SQL queries; populate an RDBMS with a real dataset, and analyse the data; design test data for testing SQL qu ...

Sqlwrite a select statement that returns three columns from

SQL Write a SELECT statement that returns three columns from the Vendors table: VendorContactFName, VendorContactLName, and VendorName. Sort the result set by last name, then by first name.

Question talk about the importance of pulling data from

Question : Talk about the importance of pulling data from worksheets into a single sheet also the ways excel could be a solution to a complex challenge. The response must be typed, single spaced, must be in times new rom ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As