Q.1
The greatest threat to business security is often internal rather than external.
Q.2
Which of the following is the preferred way to recover a database after a system failure?
Q.3
A data warehouse administrator is concerned with which of the following?
Q.4
Locking may cause which of the following problems?
Q.5
Performance analysis and tuning is which of the following?
Q.6

The transaction log includes which of the following?

  • The before-image of a record
  • The after-image of a record
  • The before and after-image of a record
  • The essential data of the record
Q.7

Information repositories are replacing data dictionaries in many organizations.

  • True
  • False
Q.8

To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.

  • True
  • False
Q.9

Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally.

  • True
  • False
Q.10

Which of the following could cause data to be unavailable?

  • Data becoming lost or inaccurate
  • The database server
  • Planned database maintenance activities
  • All of the above.
Q.11

Mirrored databases are almost always provided in high-availability systems.

  • True
  • False
Q.12

Databases are not the property of a single function or individual within the organization.

  • True
  • False
Q.13

Failure to control confidentiality may lead to loss of competitiveness.

  • True
  • False
Q.14

Authorization tables contain highly sensitive data and should be protected by stringent security rules.

  • True
  • False
Q.15

A disaster recovery plan does not need to include the shipment of database backups to other sites.

  • True
  • False
Q.16

With concurrent processing involving updates, a database with concurrency control will be compromised due to interference between users.

  • True
  • False
Q.17

A shared lock allows which of the following types of transactions to occur?

  • Delete
  • Insert
  • Read
  • Update
Q.18

Queries that do full table scans should be avoided.

  • True
  • False
Q.19

A transaction log shows before and after images of records that have been modified by transactions.

  • True
  • False
Q.20

Data modeling and database design are key responsibilities of data and data base administration.

  • True
  • False
0 h : 0 m : 1 s