Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Design
Q:
The most common backup medium has traditionally been ____________________.
Q:
In large organizations, the DSO's activities are often classified as ____________________ management.
Q:
In today's Internet environment, the DBA must also work with ____________________ and network administrators to implement efficient and secure Web-to-database connectivity.
Q:
The requirement that a password must have a maximum of 12 characters is an example of a(n) ____________________.
Q:
The DBA's function includes educating the ____________________ in the services provided and how those services enhance data stewardship and data security.
Q:
The ____________________, also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles overlap some.
Q:
The general coordinator of all DBAs is sometimes known as the ____________________ administrator.
Q:
Placing the DBA function in a(n) ____________________ position often creates a consulting environment in which the DBA is able to devise the data administration strategy but does not have the authority to enforce it or to resolve possible conflicts.
Q:
The advent of the DBMS and its shared view of data produced a new level of data management sophistication and led the DP department to evolve into a(n) _________________________ department.
Q:
Most of today's successful organizations depend on the ____________________ database to provide support for all of their operationsfrom design to implementation, from sales to services, and from daily decision making to strategic planning.
Q:
____________________deals with the rights of individuals and the organization to determine the "who, what, when, where, and how" of data usage.
Q:
____________________ decisions are short term and affect only daily operations; for example, deciding to change the price of a product to clear it from inventory.
Q:
An organization is subject to a(n) _________________________ cycle; that is, the data user applies intelligence to data to produce information that is the basis of knowledge used in decision making by the user.
Q:
One of the important functions provided by the database ____ is to reserve the resources that must be used by the database at run time.a. security component b. authorization manager c. initialization parametersd. administrator
Q:
A ____ is a named collection of settings that control how much of the database resource a given user can use.a. user b. role c. profiled. manager
Q:
A ____ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.a. user b. role c. profiled. manager
Q:
A ____ is a uniquely identifiable object that allows a given person to log on to the database.a. user b. role c. profiled. manager
Q:
In the Oracle Enterprise Manager, a ____ is basically any object created by end users; for example, tables, views, indexes, stored procedures, and triggers.a. component b. database object c. policyd. role
Q:
A(n) ____ is a logical storage space in Oracle.a. audit log b. datafile c. schemad. tablespace
Q:
A(n) ____ serves as the basis for planning, development, and control of future information systems
a. access plan
b. active data dictionary
c. information systems architecture (ISA)
d. security policy
Q:
____ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.a. Access Management b. Business Intelligence c. Information engineering (IE)d. MOLAP
Q:
The ____ component of a CASE tool produces the information system's input/output formats.a. analysis b. graphics c. program document generatord. screen painter and report generator
Q:
____ CASE tools provide support for the coding and implementation phases.a. Front-end b. Back-end c. Verticald. Horizontal
Q:
____ CASE tools provide support for the planning, analysis, and design phases.a. Front-end b. Back-end c. Verticald. Horizontal
Q:
A(n) ____ data dictionary is not updated automatically and usually requires a batch process to be run.a. active b. passive c. staticd. dynamic
Q:
A(n) ____ data dictionary is automatically updated by the DBMS with every database access.a. dynamic b. active c. passived. static
Q:
Several DBMS packages contain features that allow the creation of a(n) ____, which automatically records a brief description of the database operations performed by all users.a. change tracker b. digital footprint c. paper traild. audit log
Q:
Classifying users into ____ according to common access needs facilitates the DBA's job of controlling and managing the access privileges of individual users.a. user groups b. sections c. authorization schemesd. policy definitions
Q:
User-access management is a subset of ____.a. password protection b. authorization management c. data integrityd. managerial control
Q:
Some common physical security practices found in large database installations include secured entrances, password-protected workstations, ____, closed-circuit video, and voice-recognition technology.a. drug testing b. fingerprinting c. electronic personnel badgesd. retina scans
Q:
____ management is designed to limit access to the database.a. Authorization b. User access c. Viewd. DBMS utility
Q:
____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.a. Dangerous b. Preserving c. Corruptingd. Authorized
Q:
____deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.a. Integrity b. Compliance c. Availabilityd. Confidentiality
Q:
____activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.a. Backup and recovery b. System support c. Performance monitoring and tuningd. Security auditing and monitoring
Q:
A(n) ____ planis a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.a. access b. completion c. applicationd. communications
Q:
Current data distribution philosophy makes it easy for ____end users to access the database.a. limited b. unauthorized c. authorizedd. any
Q:
Procedures and standards must be revised at least ____ to keep them up-to-date.a. weekly b. monthly c. every six monthsd. annually
Q:
The ____ is responsible for ensuring database security and integrity.a. database programmer b. systems analyst c. data administratord. database security officer
Q:
Instructions to create a password are an example of a ____.a. rule b. policy c. standardd. procedure
Q:
"All users must have passwords" is an example of a ____.a. rule b. policy c. standardd. procedure
Q:
____ are written instructions that describe a series of steps to be followed during the performance of a given activity.a. Policies b. Standards c. Documentationd. Procedures
Q:
____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.a. Guidelines b. Standards c. Proceduresd. Documentation
Q:
____ are general statements of direction or action that communicate and support DBA goals.a. Standards b. Policies c. Documentationd. Procedures
Q:
The DBA's ____ role covers activities involving the use of the DBMS.a. administrative b. arbitration c. technicald. managerial
Q:
As a manager, the DBA must concentrate on the ____ dimensions of the database administration function.a. control and planning b. conflict and problem-resolution c. policies and standardsd. security and privacy
Q:
The DBA's ____ role is focused on personnel management and on interactions with the end-user community.a. administrative b. arbitration c. technicald. managerial
Q:
The ____ administrator is responsible for strategic planning.a. system b. data c. databased. program
Q:
There is a growing trend toward ____ in the data-management function.a. cross-training b. encapsulation c. specializationd. centralization
Q:
It is common practice to define the DBA function by dividing the DBA operations according to the ____ phases.a. SLA b. DBLC c. SDLCd. MRA
Q:
The person responsible for the control of the centralized and shared database is the database ____.a. analyst b. administrator c. programmerd. user
Q:
When introducing a database into an organization, a(n) ____ impact is likely because the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions.a. cultural b. managerial c. technicald. operational
Q:
What are some of the features provided by Web application servers?
Q:
What is JavaScript?
Q:
What is a server-side extension?
Q:
What are the main types of objects in the OLE-DB model?
Q:
What are the components in the basic ODBC architecture?
Q:
A DBMS that supports ____ exchanges can integrate with external systems such as theWeb, mobile data, and legacy systems, thus enabling the creation of new types of systems.
Q:
Using an XML ____________________, a company would be able to validate the data for values that may be out of range, incorrect dates, valid values, and so on.
Q:
A(n) ____________________ provides limited additional semantic value to XML, such as data type support or data validation rules.
Q:
Extensible Hypertext Markup Language (XHTML) is the next generation of ____________________ based on the XML framework.
Q:
XML tags must be well formed; that is, each opening tag has a corresponding ____________________ tag.
Q:
XML is derived from the _____________________________________________, an international standard for the publication and distribution of highly complex technical documents.
Q:
Because ____________________ e-commerce integrates business processes among companies, it requires the transfer of business information among different business entities.
Q:
____________________ transactionsthe sale of products or servicescan take place between businesses or between a business and a consumer.
Q:
____________________-side data input validation is one of the most basic requirements for Web applications.
Q:
A Web ____________________ server is a middleware application that expands the functionality of Web servers by linking them to a wide range of services.
Q:
Regardless of the type of Web-server interface used, the Web-to-database ____________________ program must be able to connect with the database.
Q:
APIs are faster than _________________________ scripts because the code is resident in memory and there is no need to run an external program for each request.
Q:
____________________ Web pages are at the heart of current generation Web sites.
Q:
The Web ____________________ is the main hub through which all Internet services are accessed.
Q:
___________________________________ is an application programming interface that allows a Java program to interact with a wide range of data sources (relational databases, tabular data sources, spreadsheets, and text files).
Q:
The Microsoft ____________________ frameworkis a component-based platform for developing distributed, heterogeneous, interoperable applications aimed at manipulating any type of data over any network under any operating system and any programming language.
Q:
______________________________ provides a unified interface to access data from any programming language that uses the underlying OLE-DB objects.
Q:
A(n) ____________________is written in a programming language that is not compiled, but is interpreted and executed at run time.
Q:
In the OLE-DB model, the ____________________ acts like a data consumer of the data provider and as a data provider for the data consumer (end-user application).
Q:
____________________are objects (applications or processes) that request and use data.
Q:
____________________ are objects that manage the connection with a data source and provide data to the consumers.
Q:
A(n) ____________________ is a unique name by which the data source will be known to ODBC, and therefore, to applications.
Q:
_________________________ is a higher-level object-oriented application interface used to access remote database servers.
Q:
ODBC is ____________________'s implementation of a superset of the SQL Access Group CLI.