Pregunta 1
Pregunta
1.The DBMS must provide tools that give each level of management a different view of the data and support the required level of decision-making.
Pregunta 2
Pregunta
2.An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations
Pregunta 3
Pregunta
3.Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
Pregunta 4
Pregunta
4.The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization.
Pregunta 5
Pregunta
5.The DBA interacts with the end user by providing data and information support services to the organization’s departments.
Pregunta 6
Pregunta
6.The security, privacy, and integrity of the data in the database are of minimal concern to DBAs who manage current DBMS installations.
Pregunta 7
Pregunta
7.Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.
Pregunta 8
Pregunta
8.A full backup, or database dump, produces a complete copy of the entire database.
Pregunta 9
Pregunta
9.Incremental backups produce a backup of all data.
Pregunta 10
Pregunta
10.Concurrent backups take place while the user is working on the database.
Pregunta 11
Pregunta
11.Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database.
Pregunta 12
Pregunta
12.The storage locations for multiple backups must include sites inside and outside the organization.
Pregunta 13
Pregunta
13.Physical protection of hardware and software must be accomplished by the use of open installations with restricted area access.
Pregunta 14
Pregunta
14.The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
Pregunta 15
Pregunta
15.The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.
Pregunta 16
Pregunta
16.The end user’s role requires a broad understanding of DBMS functions, configuration, programming languages, data modeling and design methodologies, and so on.
Pregunta 17
Pregunta
17.The DBA must supervise the installation of all software and hardware designated to support the data administration strategy, must have a thorough understanding of the components being installed, and must be familiar with the installation, configuration, and startup procedures of such components.
Pregunta 18
Pregunta
18.The DBA function provides data modeling and design services to the enduser community, often through coordination with an application development group within the data-processing department.
Pregunta 19
Pregunta
19.The DBA works with managers to ensure the quality and integrity of database design and transactions.
Pregunta 20
Pregunta
20.The end user must provide testing and evaluation services for all the database and DBA applications.
Pregunta 21
Pregunta
21.Testing procedures and standards must already be in place before any application program can be approved for use in the company.
Pregunta 22
Pregunta
22.System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
Pregunta 23
Pregunta
23.The allocation of storage resources is determined when the DBMS is created.
Pregunta 24
Pregunta
24.Training people to use the DBMS and its tools is not included in the DBA’s technical activities.
Pregunta 25
Pregunta
25.The maintenance activities of the DBA are an extension of the operational activities.
Pregunta 26
Pregunta
26.Security breaches can yield a database whose integrity is either preserved or corrupted.
Pregunta 27
Pregunta
27.Protecting the data in the database is a function of authorization management.
Pregunta 28
Pregunta
28.The DBA must define data views to protect and control the scope of the data that are accessible to an authorized user.
Pregunta 29
Pregunta
29.Database access can be controlled by placing limits on the use of the DBMS’s query and reporting tools.
Pregunta 30
Pregunta
30.The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.