A ____________ is a disconnected, memory-resident representation of the database which contains tables, columns, rows, relationships, and constraints.

  a. DataSymbol  

 

  b. DataObject  

 

  c. DataMart  

 

  d. DataSet

 

_______ is an object-oriented programming language developed by Sun Microsystems that runs on top of Web browser software.

  a. ActiveX  

 

  b. Python  

 

  c. Java  

 

  d. JavaScript

 

____________ is rapidly becoming the data exchange standard for e-commerce applications; it is important because it provides the semantics that facilitate the sharing, exchange, and manipulation of structured documents over organizational boundaries.

  a. Semantic Markup Language (SML)  

 

  b. Unified Markup Language (UML)  

 

  c. Extensible Markup Language (XML)  

 

  d. PML (Programming Markup Language (PML)

 

________ the objects that manage the connection with a data source and provide data to the consumers.

  a. Providers  

 

  b. Servers  

 

  c. Consumers  

 

  d. Producers

 

An _____________ document is an advanced data definition language that is used to describe the structure (elements, data types, relationship types, ranges, and default values) of XML data documents.

  a. Unified Markup Language (UML)  

 

  b. Extensible Markup Language (XML)  

 

  c. Semantic Markup Language (SML)  

 

  d. XML Schema Definition (XSD)

 

 

Which of the following is NOT a common feature of a web application server?

  a. Security and authentication of users  

 

  b. Database access with transaction management  

 

  c. Performance and fault tolerance  

 

  d. All of these choices are correct.

 

To define a ______________ you must create a data source name (DSN) for the data source.

  a. data source  

 

  b. detailed data source  

 

  c. named space  

 

  d. remote data space

 

A __________ is an external application that is automatically invoked by the browser when needed.

  a. plug-in  

 

  b. program  

 

  c. preference  

 

  d. app

 

Which of the following is NOT a database connectivity option?

  a. Native SQL connectivity  

 

  b. ODBC, DAO, RDO  

 

  c. ABC.NET  

 

  d. OLE-DB

 

Which of the following is a type of cloud computing implementation?

  a. Private cloud  

 

  b. Public cloud  

 

  c. Community cloud  

 

  d. All of these choices are correct.

 

___________________ refers to the mechanisms through which application programs interact and communicate with data repositories.

  a. Database connectivity  

 

  b. Database management  

 

  c. Database development  

 

  d. Database schema

 

 

A _________ is a series of instructions executed in interpreter mode; it is a plain text file that is not compiled like COBOL, C++, or Java.

  a. script  

 

  b. processor  

 

  c. module  

 

  d. function

 

Microsoft developed _________to answer the need for non-relational data access and to simplify data connectivity.

  a. DEO  

 

  b. ODBC  

 

  c. OLE-DB  

 

  d. RDO

 

_______ was the first piece of Microsoft’s strategy to provide a unified object-oriented framework for the development of next-generation applications.

  a. ODBC  

 

  b. RDO  

 

  c. OLE-DB  

 

  d. DEO

 

Which of the following is a well-defined web server interface used frequently today?

  a. Constant interfaces (CI)  

 

  b. Artificial interfaces (AI)  

 

  c. Common gateway interfaces (CGI)  

 

  d. None of these choices are correct.

 

______________is “a computing model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computer resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

  a. Cloud computing  

 

  b. Cloud servicing  

 

  c. Cloud networking  

 

  d. Cloud programming

 

_____________ is a file that describes XML elements—it provides the composition of the database’s logical model, and defines the syntax rules or valid tags for each type of XML document.

  a. Extensible Markup Language (XML)  

 

  b. Semantic Markup Language (SML)  

 

  c. Unified Markup Language (UML)  

 

  d. Document Type Definition (DTD)

 

Which of the following is/are the basic components of the ODBC architecture?

  a. A Driver Manager  

 

  b. An ODBC Driver  

 

  c. A high level ODBC API  

 

  d. All of these choices are correct.

 

Once the DataSet is populated, it is completely independent of the data source – that’s why it’s called “_________”.

  a. disjoint  

 

  b. apportioned  

 

  c. independent  

 

  d. disconnected

 

Which of the following is NOT one of the most prevalent characteristics of cloud computing services?

  a. Higher cost and standard pricing  

 

  b. Service orientation  

 

  c. Managed operations  

 

  d. All of these choices are correct.

 

Which of the following is considered an advantage of SQL data services?

  a. Dynamic and automatic load balancing  

 

  b. Automated backup and disaster recovery  

 

  c. High level of failure tolerance  

 

  d. All of these choices are correct.

 

 

Which of the following has the potential to turn basic IT services into “commodity” services such as electricity, gas, and water, and to enable a revolution that could change not only the way that companies do business, but the IT business itself?

  a. Cloud services  

 

  b. DataMart systems  

 

  c. Distributed database systems  

 

  d. Cybersecurity services

 

Which of the following is a type of cloud service that offers turnkey applications that run in the cloud?

  a. PaaS  

 

  b. IaaS  

 

  c. SaaS  

 

  d. None of these choices are correct.

 

Which of the following is NOT considered a main advantage of cloud computing services?

  a. Low initial cost of entry  

 

  b. Complex licensing schemes  

 

  c. High reliability and performance  

 

  d. Fast provisioning

 

Which of the following is required to create an ODBC data source name?

  a. ODBC driver  

 

  b. ODBC driver parameters  

 

  c. A DSN name  

 

  d. All of these choices are correct.

 

__________________ is an application programming interface that allows a Java program to interact with a wide range of data sources (relational databases, tabular data sources, spreadsheets, and text files).

  a. Java Database Connectivity (JDBC)  

 

  b. Unified Markup Language (UML)  

 

  c. Semantic Markup Language (SML)  

 

  d. Document Type Definition (DTD)

 

___________ is a meta-language used to represent and manipulate data elements.

  a. Semantic Markup Language (SML)  

 

  b. Extensible Markup Language (XML)  

 

  c. PML (Programming Markup Language (PML)  

 

  d. Unified Markup Language (UML)

 

____________________ are used to extend the functionality of the web server to provide more services and to provide support for access to external databases, fax services, telephony services, directory services, etc.

  a. Server users  

 

  b. Web server interfaces  

 

  c. Server programs  

 

  d. Web server associations

 

______ provides an optimized interface that exposed the functionality of the Jet data engine (on which MS Access database if based on) to programmers.

  a. REO  

 

  b. DAO  

 

  c. OLE-DC  

 

  d. ODBC

 

The OLE-DB model is based on which of the two types of objects?

  a. consumers, providers  

 

  b. clients, servers  

 

  c. consumers, producers  

 

  d. clients, users

 

 

Which of the following is NOT considered a disadvantage of cloud computing services?

  a. Issues of security, privacy, and compliances  

 

  b. Low initial cost of entry  

 

  c. Loss of ownership and control  

 

  d. Complex licensing schemes

 

 

A ______________ is a middleware application that expands the functionality of servers by linking them to a wide range of services such as databases, directory systems, and search engines.

  a. web dominant server  

 

  b. client application server  

 

  c. web application server  

 

  d. plug-in server

 

_______________is “a computing model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computer resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

  a. Cloud computing  

 

  b. Cloud networking  

 

  c. Cloud programming  

 

  d. Cloud servicing

 

____ allows any Windows application to access relational data sources using SQL via a standard application programming interface (API).

  a. OLE-DC  

 

  b. RAO  

 

  c. ODBC  

 

  d. REO

 

The web is a(n) ________________ in that at any given time, a web server does not know the status of any of the clients communicating with it.

  a. stateless system  

 

  b. simple configuration  

 

  c. dormant medium  

 

  d. inactive status

 

To provide such support for scripting languages, especially the ones used for web development, such as Active Server Pages (ASP) and ActiveX, Microsoft developed a new object framework called _______________.

  a. ActiveX Data Objects (ADO)  

 

  b. Remote Data Objects (RDO)Servers  

 

  c. Object Linking and Embedding for Database (OLE-DB)  

 

  d. Data Access Objects (DAO)

 

_______________ refers to Internet-based data management services that provide access to hosted relational data management using standard protocols and common programming interfaces.

  a. Cloud data services  

 

  b. SQL data services  

 

  c. Database services  

 

  d. DataMart data services

 

 

_______________ scripts contain the code that is required to connect, query, and update a database from a Web front end.

  a. ColdFusion  

 

  b. Microsoft  

 

  c. Java  

 

  d. File Manager

 

______ uses the lower-level DAO and ODBC for direct access to databases.

  a. OLE-DC  

 

  b. ODBC  

 

  c. RDO  

 

  d. DEO

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Using the tags and words on the right, complete the XML document below. The “Customers” tag contains zero or more “Customer” children and the “Customer” tag may contain all of the remaining tags as children.

 

 

 

C:\Users\ediso\AppData\Local\Microsoft\Windows\INetCache\Content.Word\question1.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Given the following XML document that contains an internal DTD. Complete the DTD to accurately describe the XML.

C:\Users\ediso\AppData\Local\Microsoft\Windows\INetCache\Content.Word\2.png C:\Users\ediso\AppData\Local\Microsoft\Windows\INetCache\Content.Word\3.png

_____ are raw facts of interest to an end user. Examples include a person’s date of birth, an employee name, the number of pencils in stock, etc.

  a. Knowledge  

 

  b. Statistics  

 

  c. Data  

 

  d. Information

 

Which of the following is NOT a benefit of a CASE tool?

  a. Increase in development time and costs  

 

  b. Easier maintenance of application systems  

 

  c. Automation of the SDLC  

 

  d. Standardization of system development methodologies

 

____________ allows for the translation of the company’s strategic goals into the data and applications that will help the company achieve those goals.

  a. CASE tools  

 

  b. Database Management  

 

  c. User Planning  

 

  d. Information Engineering

 

 

_________ refers to activities and measures that ensures the confidentiality, integrity, and availability of an information system and its main asset, data.

  a. Performance  

 

  b. Maintenance  

 

  c. Security  

 

  d. Design

 

____________ refers to activities and measures that ensures the confidentiality, integrity, and availability of an information system and its main asset, data.

  a. Performance  

 

  b. Maintenance  

 

  c. Security  

 

  d. Design

 

 

Which of the following is an example of data dictionary usage using SQL statements?

  a. List the names of the columns for all tables created by JONESVI in the current database  

 

  b. List the user and table names for all users who can alter the database structure for any table in the database  

 

  c. List the names and creation dates of all tables created by the user JONESVI in the current database  

 

  d. All of these choices are correct.

 

Which of the following is NOT a desired managerial characteristic or skill for a DBA?

  a. Conflict resolution skills  

 

  b. Analytical skills  

 

  c. Negotiation skills  

 

  d. Knowledge of database life cycle

 

Which of the following is NOT a source of dirty data?

  a. Typographical errors  

 

  b. Nonstandard abbreviations  

 

  c. Use of synonyms across systems  

 

  d. Enforcement of integrity constraints

 

The DBA works with application programmers to ensure the quality and integrity of database design and transactions by ensuring that transactions are:

  a. variable and static.  

 

  b. small, linear, and isolated.  

 

  c. correct, efficient, and compliant.  

 

  d. All of these choices are correct.

 

A(n) ________________ automatically records a brief description of database operations performed by all users.

  a. audit log  

 

  b. usage table  

 

  c. data dictionary  

 

  d. security manual

 

Which of the following is NOT a desired technical characteristic or skill for a DBA?

  a. Negotiation skills  

 

  b. Database modeling and design  

 

  c. Structured methodologies  

 

  d. Knowledge of database life cycle

 

Which of the following is NOT an area that a DBA must define, communicate and enforce procedures for?

  a. Providing end-user training  

 

  b. Establishing backup and recovery for databases  

 

  c. Finding new customers  

 

  d. Finding new database software

 

Which of the following is NOT an activity of characteristic of a DBA?

  a. is DBMS-specific  

 

  b. has a tactical orientation  

 

  c. focuses on the long term  

 

  d. controls and supervises

 

Which of the following DBA activities are used to support end users?

  a. Resolving conflicts and problems  

 

  b. Finding solution to information needs  

 

  c. Ensuring quality and integrity of data and applications  

 

  d. All of these choices are correct.

 

Which of the following is considered the two most important assets of any organization?

  a. Users and costs  

 

  b. Money and power  

 

  c. Customers and goals  

 

  d. People and data

 

Some of the common features of a data dictionary include:

  a. end users and administrators of the database.  

 

  b. relationships among data elements.  

 

  c. tables defined in all databases.  

 

  d. All of these choices are correct

 

The technical aspects of the DBA’s job are rooted in which of the following areas of operation?

  a. training and supporting users  

 

  b. evaluating, selecting, and installing the DBMS and related utilities  

 

  c. testing and evaluating databases and applications  

 

  d. All of these choices are correct.

 

The backup and recovery measures must include which of the following?

  a. convenient and safe backup storage.  

 

  b. physical protection of both hardware and software.  

 

  c. periodic data and application backups.  

 

  d. All of these choices are correct.

 

Which of the following is NOT considered one of the DBA’s responsibilities?

  a. Responsible for managing the overall corporate data resource, both computerized and non-computerized  

 

  b. Position requires both managerial and technical skills  

 

  c. Control and management of the shared database within an organization  

 

  d. All of these choices are part of the DBA’s responsibilities.

 

Which of the following is NOT a role the DBMS facilitates?

  a. Distribution of data and information  

 

  b. Interpretation and presentation of data  

 

  c. Data preservation and monitoring data usage  

 

  d. All of these choices are correct.

 

 

_________ is a comprehensive approach to ensuring the accuracy, validity, and timeliness of the data.

  a. Data construction  

 

  b. Data quality  

 

  c. Data statistics  

 

  d. Dirty data

 

Which of the following is NOT an activity of characteristic of a DA?

  a. has a tactical orientation  

 

  b. focuses on the long term  

 

  c. performs strategic planning  

 

  d. is DBMS-independent

 

 

Which of the following must happen when a corrupting security breach occurs?

  a. The entire database must be removed  

 

  b. The database must be recovered to a consistent state  

 

  c. The users must be notified  

 

  d. The business must immediately shutdown all operations

 

______________ is data that contains inaccuracies or inconsistencies (i.e. data that lacks integrity) and may result from a lack of enforcement of integrity constraints, typographical errors, the use of synonyms and homonyms across systems, the use of nonstandard abbreviations, or differences in the decomposition of composite attributes.

  a. Dirty data  

 

  b. Knowledge  

 

  c. Data  

 

  d. Statistics

 

A _______________ is a named collection of database access privileges that authorize a user to connect to the database and use its system resources.

  a. role  

 

  b. dataspace  

 

  c. user  

 

  d. instance

 

A _____________ tool provides an automated framework for the systems development life cycle (SDLC) and is classified according to the extent of support it provides for the SDLC.

  a. user  

 

  b. CASE  

 

  c. audit  

 

  d. management

 

As a DBA, what data dimensions would you describe to top-level managers to obtain their support for endorsing the data administration function?

  a. identify and define the need for and role of the DBMS in the organization  

 

  b. emphasize the importance of data as a company asset, to be managed as any other asset  

 

  c. the need to illustrate and explain the impact of a DBMS in an organization  

 

  d. All of these choices are correct.

 

 

Which of the following special considerations must you take into account when introducing a DBMS into an organization?

  a. Expect some resistance to change  

 

  b. How to deal with resistance to change  

 

  c. Retraining requirements for the new system  

 

  d. All of these choices are correct.

 

 

Database performance will naturally __________ as the database grows and more users access it.

  a. increase  

 

  b. stabilize  

 

  c. change  

 

  d. decrease

 

________are general statements of direction or action that communicate and support DBA goals. Examples include: all users must have passwords or passwords must be changed every six months.

  a. Policies  

 

  b. Standards  

 

  c. Documents  

 

  d. Procedures

 

Which of the following cloud related features should be included on a DBA’s checklist of desired DBMS features?

  a. Downtime history  

 

  b. Data loss contingencies  

 

  c. Security  

 

  d. All of these choices are correct.

 

Which of the following statements best explains the role of databases in organizations?

  a. The database’s predominant role is to support client information at all levels in the organization.  

 

  b. The database’s predominant role is to support user transactions at all levels in the organization.  

 

  c. The database’s predominant role is to support managerial decision making at all levels in the organization.  

 

  d. None of these choices are correct.

 

 

A database _________ is a logical section of the database that belongs to a given user and is identified by the username.

  a. datafile  

 

  b. role  

 

  c. schema  

 

  d. user

 

The ________________ is responsible for controlling the overall corporate data resources, both computerized and manual.

  a. database administrator (DBA)  

 

  b. security administrator (SA)  

 

  c. data administrator (DA)  

 

  d. database manager (DM)

 

Which of the following should NOT be included on a DBA’s checklist of desired DBMS features?

  a. Portability and standards  

 

  b. Security and integrity  

 

  c. Application development support  

 

  d. Employment contracts

 

A ________________ is a collection of standards, policies, and procedures created to guarantee the security of a system and ensure auditing and compliance.

  a. security policy  

 

  b. security standard  

 

  c. security officer  

 

  d. security portfolio

 

A _______________ physically stores the database’s data and is associated with only one tablespace but can reside in a different directory on the hard disk or on multiple hard disks.

  a. datafile  

 

  b. role  

 

  c. user  

 

  d. instance

 

 

________are written instructions that describe a series of steps to be followed during the performance of a given activity. They must be developed within existing working conditions, and they must support and enhance the working environment.

  a. Procedures  

 

  b. Standards  

 

  c. Documents  

 

  d. Policies

 

Which of the following is a reason why data quality is important?

  a. Without it accurate and timely information cannot be produced  

 

  b. Without it, organizations can fail in their competitive environments  

 

  c. Without it, it is difficult to make good decisions  

 

  d. All of these choices are correct.

 

Which of the following is NOT a level of data confidentiality?

  a. Confidential  

 

  b. Open source  

 

  c. Highly restricted  

 

  d. Unrestricted

 

Which parts of the system does the evaluation process cover?

  a. Documentation and procedures  

 

  b. Applications only  

 

  c. Documentation only  

 

  d. Procedures only

 

A _____________ is a DBMS component that stores the definition of data characteristics and relationships.

  a. security manual  

 

  b. data dictionary  

 

  c. usage table  

 

  d. audit log

 

Which of the following is a desired characteristic or skill for a DBA?

  a. Knowledge of database life cycle  

 

  b. Conflict resolution skills  

 

  c. Analytical skills  

 

  d. All of these choices are correct.

 

_______describe the minimum requirements of a given DBA activity; they are more detailed and specific than policies and are rules that evaluate the quality of the activity. Examples include: a password must have a minimum of 5 characters and a password must have a maximum of 12 characters.

  a. Policies  

 

  b. Standards  

 

  c. Procedures  

 

  d. Documents

 

A _______________ is a logical storage space that is used primarily to group related data logically.

  a. tablespace  

 

  b. dataspace  

 

  c. datafile  

 

  d. instance

 

Cloud services provide which of the following?

  a. DBMS installation and updates.  

 

  b. server and network management.  

 

  c. backup and recovery operations.  

 

  d. All of these choices are correct.

 

DBMS operations can be divided into which of the following four main areas?

  a. daily operations, running programs, hardware status, emergency power sources  

 

  b. system support, performance monitoring and tuning, backup and recovery, and security auditing and monitoring  

 

  c. query optimization, database recovery, backup frequency, and establishing primary and secondary memory  

 

  d. establish DBMS performance goals, monitor the DBMS, isolate problems, implement performance solutions

 

A _______________ is a separate location in memory that is reserved to run your database.

  a. database slice  

 

  b. database section  

 

  c. database instance  

 

  d. database role

 

 

Security vulnerabilities can fall under which of the following categories?

  a. managerial  

 

  b. technical  

 

  c. procedural  

 

  d. All of these choices are correct.

 

___________ is processed data or the product of applying some analytical process to data.

  a. Data  

 

  b. Statistics  

 

  c. Information  

 

  d. Knowledge

 

Which of the following is NOT one of the characteristics of the DBMS approach over the file-system approach?

  a. A file system uses a “shared-ownership” approach while a DBMS uses a “single-ownership” approach  

 

  b. The change from DP to MIS shifts data management from an operational level to a tactical or strategic level  

 

  c. A change in focus or function when the shift from file system to the DBMS occurs  

 

  d. None of these choices are correct.

 

__________ deals with the rights of people and organizations to determine who accesses the data and when, where, and how the data are to be used.

  a. Integrity  

 

  b. Quality  

 

  c. Privacy  

 

  d. Security

 

 

___________________ defines procedures to protect and guarantee database security and integrity and includes user access management, view definition, DBMS access control, and DBMS usage monitoring.

  a. Authorization management  

 

  b. Access management  

 

  c. User management  

 

  d. Usage management

 

 

The DBA has a(n) ___________ role in installing and maintain the BMS that is in a cloud-based environment.

  a. decreased  

 

  b. isolated  

 

  c. increased  

 

  d. non-existent

 

___________ means protecting the data against accidental or intentional use by unauthorized users.

  a. Quality  

 

  b. Integrity  

 

  c. Privacy  

 

  d. Security

 

________ within the data security framework is concerned with keeping data consistent and free of errors or anomalies.

  a. Confidentiality  

 

  b. Integrity  

 

  c. Security  

 

  d. Compliance

 

Match the roles with the role’s description:

 

 
Data Administrator (DA) http://cnow.apps.ng.cengage.com/media/img/pt/dhtml/matching/transparent-blueL.gif http://cnow.apps.ng.cengage.com/ilrn/bca/resources/matching/image?width=68&height=529 http://cnow.apps.ng.cengage.com/media/img/pt/dhtml/matching/transparent-blueR.gif This person may access the database depending upon business requirements.
         
Information Resource Manager http://cnow.apps.ng.cengage.com/media/img/pt/dhtml/matching/transparent-blueL.gif   http://cnow.apps.ng.cengage.com/media/img/pt/dhtml/matching/transparent-blueR.gif Thus person’s sole job is to ensure database security and integrity. In large organizations.
         
Database Security Officer (DSO) http://cnow.apps.ng.cengage.com/media/img/pt/dhtml/matching/transparent-blueL.gif   http://cnow.apps.ng.cengage.com/media/img/pt/dhtml/matching/transparent-blueR.gif This person is the general coordinator of all DBAs.
         
Systems Administrator http://cnow.apps.ng.cengage.com/media/img/pt/dhtml/matching/transparent-blueL.gif   http://cnow.apps.ng.cengage.com/media/img/pt/dhtml/matching/transparent-blueR.gif In may organizations the Data Administrator is known by this title.
         
Database Administrator (DBA) http://cnow.apps.ng.cengage.com/media/img/pt/dhtml/matching/transparent-blueL.gif   http://cnow.apps.ng.cengage.com/media/img/pt/dhtml/matching/transparent-blueR.gif This person usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA.
         
User http://cnow.apps.ng.cengage.com/media/img/pt/dhtml/matching/transparent-blueL.gif   http://cnow.apps.ng.cengage.com/media/img/pt/dhtml/matching/transparent-blueR.gif The person responsible for control of the centralized and shared database.

 

 

 

 

 

dentify each of the following as either “A – data security” risks or “B – database security” risks.

1.  Weak user password  
2.  Computer screen visible to unauthorized individuals

3.  User copies data to a USB drive  
4.  Unauthorized PC access  
5.  Virus on user PC  
6.  Phishing or Spamming  
7.  Open data shares  
8.  Lack of proper backup  

 

 

 

 

Item 2

Leave a Reply

Your email address will not be published. Required fields are marked *