Frage 1
Frage
1.The DBMS must provide tools that give each level of management a different view of the data and support the required level of decision-making.
Frage 2
Frage
2.An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations
Frage 3
Frage
3.Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
Frage 4
Frage
4.The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization.
Frage 5
Frage
5.The DBA interacts with the end user by providing data and information support services to the organization’s departments.
Frage 6
Frage
6.The security, privacy, and integrity of the data in the database are of minimal concern to DBAs who manage current DBMS installations.
Frage 7
Frage
7.Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.
Frage 8
Frage
8.A full backup, or database dump, produces a complete copy of the entire database.
Frage 9
Frage
9.Incremental backups produce a backup of all data.
Frage 10
Frage
10.Concurrent backups take place while the user is working on the database.
Frage 11
Frage
11.Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database.
Frage 12
Frage
12.The storage locations for multiple backups must include sites inside and outside the organization.
Frage 13
Frage
13.Physical protection of hardware and software must be accomplished by the use of open installations with restricted area access.
Frage 14
Frage
14.The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
Frage 15
Frage
15.The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.
Frage 16
Frage
16.The end user’s role requires a broad understanding of DBMS functions, configuration, programming languages, data modeling and design methodologies, and so on.
Frage 17
Frage
17.The DBA must supervise the installation of all software and hardware designated to support the data administration strategy, must have a thorough understanding of the components being installed, and must be familiar with the installation, configuration, and startup procedures of such components.
Frage 18
Frage
18.The DBA function provides data modeling and design services to the enduser community, often through coordination with an application development group within the data-processing department.
Frage 19
Frage
19.The DBA works with managers to ensure the quality and integrity of database design and transactions.
Frage 20
Frage
20.The end user must provide testing and evaluation services for all the database and DBA applications.
Frage 21
Frage
21.Testing procedures and standards must already be in place before any application program can be approved for use in the company.
Frage 22
Frage
22.System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
Frage 23
Frage
23.The allocation of storage resources is determined when the DBMS is created.
Frage 24
Frage
24.Training people to use the DBMS and its tools is not included in the DBA’s technical activities.
Frage 25
Frage
25.The maintenance activities of the DBA are an extension of the operational activities.
Frage 26
Frage
26.Security breaches can yield a database whose integrity is either preserved or corrupted.
Frage 27
Frage
27.Protecting the data in the database is a function of authorization management.
Frage 28
Frage
28.The DBA must define data views to protect and control the scope of the data that are accessible to an authorized user.
Frage 29
Frage
29.Database access can be controlled by placing limits on the use of the DBMS’s query and reporting tools.
Frage 30
Frage
30.The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.