Question 1
Question
1.The DBMS must provide tools that give each level of management a different view of the data and support the required level of decision-making.
Question 2
Question
2.An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations
Question 3
Question
3.Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
Question 4
Question
4.The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization.
Question 5
Question
5.The DBA interacts with the end user by providing data and information support services to the organization’s departments.
Question 6
Question
6.The security, privacy, and integrity of the data in the database are of minimal concern to DBAs who manage current DBMS installations.
Question 7
Question
7.Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.
Question 8
Question
8.A full backup, or database dump, produces a complete copy of the entire database.
Question 9
Question
9.Incremental backups produce a backup of all data.
Question 10
Question
10.Concurrent backups take place while the user is working on the database.
Question 11
Question
11.Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database.
Question 12
Question
12.The storage locations for multiple backups must include sites inside and outside the organization.
Question 13
Question
13.Physical protection of hardware and software must be accomplished by the use of open installations with restricted area access.
Question 14
Question
14.The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
Question 15
Question
15.The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.
Question 16
Question
16.The end user’s role requires a broad understanding of DBMS functions, configuration, programming languages, data modeling and design methodologies, and so on.
Question 17
Question
17.The DBA must supervise the installation of all software and hardware designated to support the data administration strategy, must have a thorough understanding of the components being installed, and must be familiar with the installation, configuration, and startup procedures of such components.
Question 18
Question
18.The DBA function provides data modeling and design services to the enduser community, often through coordination with an application development group within the data-processing department.
Question 19
Question
19.The DBA works with managers to ensure the quality and integrity of database design and transactions.
Question 20
Question
20.The end user must provide testing and evaluation services for all the database and DBA applications.
Question 21
Question
21.Testing procedures and standards must already be in place before any application program can be approved for use in the company.
Question 22
Question
22.System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
Question 23
Question
23.The allocation of storage resources is determined when the DBMS is created.
Question 24
Question
24.Training people to use the DBMS and its tools is not included in the DBA’s technical activities.
Question 25
Question
25.The maintenance activities of the DBA are an extension of the operational activities.
Question 26
Question
26.Security breaches can yield a database whose integrity is either preserved or corrupted.
Question 27
Question
27.Protecting the data in the database is a function of authorization management.
Question 28
Question
28.The DBA must define data views to protect and control the scope of the data that are accessible to an authorized user.
Question 29
Question
29.Database access can be controlled by placing limits on the use of the DBMS’s query and reporting tools.
Question 30
Question
30.The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.