Filters
Question type

Study Flashcards

_____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.


A) Guidelines
B) Standards
C) Procedures
D) Documentations

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

_____ CASE tools provide support for the coding and implementation phases.


A) Front-end
B) Back-end
C) Vertical
D) Horizontal

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of database access privileges that authorize a user to connect to the database and use its system resources.

Correct Answer

verifed

verified

The _____ administrator is responsible for strategic planning.


A) system
B) data
C) database
D) program

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A(n) _____ data dictionary is not updated automatically and usually requires a batch process to be run.


A) active
B) passive
C) static
D) dynamic

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

A(n) _____ plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time.


A) access
B) completion
C) application
D) communications

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.

A) True
B) False

Correct Answer

verifed

verified

A security _____ is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

Correct Answer

verifed

verified

In the context of developing a data administration strategy, a(n) _____ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools.


A) access plan
B) active data dictionary
C) information systems architecture
D) security policy

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Performance monitoring and _____ activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels.

Correct Answer

verifed

verified

The DBA interacts with the end user by providing data and information support services to the organization's departments.

A) True
B) False

Correct Answer

verifed

verified

A(n) _____ is a logical storage area in Oracle.


A) audit log
B) datafile
C) schema
D) tablespace

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Within the data security framework, _____ is concerned with keeping data consistent and free of errors or anomalies.

Correct Answer

verifed

verified

The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.

A) True
B) False

Correct Answer

verifed

verified

One of the important functions provided by the database _____ is to reserve the resources that must be used by the database at run time.


A) security component
B) authorization manager
C) initialization parameters
D) administrator

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following is a reason why a DBMS's daily operations must be clearly documented?


A) Documentation of the daily operations help a company set its long-term goals.
B) Documentation of the daily operations help manage the manual data resources of a company.
C) Documentation of the daily operations help pinpoint causes and solutions of database problems.
D) Documentation of the daily operations help free the DBA from many lower-level technology-oriented tasks.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

In the context of Oracle Enterprise Manager, a(n) _____ isa uniquely identifiable object that allows a given person to log on to the database.

Correct Answer

verifed

verified

A data administrator is also known as a(n) _____.


A) data security officer
B) systems administrator
C) information resource manager
D) information engineering officer

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

In the context of ensuring integrity of a database, a(n) _____ transaction is one that does not overload the DBMS.

Correct Answer

verifed

verified

In the context of database administration, _____ is the extent to which individuals and organizations have the right to determine the "who, what, when, where, and how" of data usage.

Correct Answer

verifed

verified

Showing 41 - 60 of 74

Related Exams

Show Answer