Uploaded by wilkson_patrick

mis 3306 DBMS Chapter 9 stdy guide

advertisement
DBMS Chapter 9
Study online at quizlet.com/_4717sw
1.
_____ can render data useless to
unauthorized users who might have
violated some of the database security
layers.
Data
encryption
14.
In the context of the database design
process, the conceptual design step that
determines end-user views, outputs, and
transaction-processing requirements in
______.
Data analysis
and
requirements
2.
Coding, testing, and debugging are part
of the ______ phase of the Systems
Development Life Cycle (SDLC).
Implementation
15.
_____ is a technique that creates logical
representations of computing resources
that are independent of the underlying
physical computing resources.
Virtualization
The database contents are loaded during
the _____ phase of the Systems
Development Life Cycle (SDLC).
Implementation
16.
______ is the process of determining the data
storage organization and data
characteristics of the database to ensure its
integrity, security, and performance.
Physical
design
Discovery of user requirements, existing
system evaluation, and logical system
design are part of the _____ phase of the
Systems Development Life Cycle (SDLC).
Analysis
17.
The last step in the Database Life Cycle
(DBLC) is _____.
Maintenance
and
evolution
During decentralized design, after the
_____ has been completed, all modules are
integrated into one conceptual model.
Verification
process
18.
The logical systems design is created during
the ______ phase of the Systems
Development Life Cycle (SDLC).
Analysis
The feasibility study during the planning
phase of the Systems Development Life
Cycle (SDLC) must address the:
Technical
aspects of
hardware and
software
requirements.
19.
The maintenance and evolution phase of
the Database Life Cycle (DBLC) involves
______.
Introducing
changes
7.
The first step in developing the
conceptual model using ER diagrams is to
______.
Identify,
analyze, and
refine the
business rules.
20.
Once the data has been loaded into the
database, the ______ tests and fine-tunes the
database for performance, integrity,
concurrent access, and security constraints.
Database
Administrator
8.
The first step in the ER model verification
process is to _____.
Identify the ER
model's central
entity
21.
The process of creating an information
system is known as _____.
Systems
development
22.
The implementation and loading phase of
the Database Life Cycle (DBLC) involves
______.
Installing the
DBMS.
Producing the required information flow is
part of the ______ phase of the Database Life
Cycle (DBLC).
Operation
9.
23.
10.
The implementation of _____ applications
tends to prolong the operational life of
systems by making them easier to update
and maintain.
CASEproduced
Selecting database management system
(DBMS) software is part of the _____ phase of
the Database Life Cycle (DBLC).
Database
design
24.
Planning
11.
In a(n) _____, only the objects that have
been updated or modified since the last
full backup are backed up.
Differential
backup
"Should the existing system be replaced?" is
a question that is asked during the _____
stage of the Systems Development Life
Cycle (SDLC).
25.
12.
In DBLC, the phase after the database
initial study is ______.
Database
design
Which of the following is a hardwareinduced database failure?
Memory chip
errors
13.
In the context of the database design
process, the conceptual design step that
defines the fragmentation and allocation
strategy is _____.
Distributed
database
design
3.
4.
5.
6.
Download