Database Management Approach Flashcards

(59 cards)

1
Q

What is a flat-file approach?

A

Data files that contain records with no structured relationships to other files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a significant problem in a flat-file environment?

A

Data redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a Database Management System (DBMS) control?

A

Access to the data resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the benefits of using a database approach?

A
  • Elimination of Data Storage Problem
  • Elimination of Data Update Problem
  • Elimination of Currency Problem
  • Elimination of Task-Data Dependency Problem
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the key elements of a database environment?

A
  • Database management system (DBMS)
  • Users
  • Database administrator
  • Physical database
  • DBMS models
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the central element of the database approach system?

A

Database Management System (DBMS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Data Definition Language?

A

Identifies the names and the relationship of all data elements, records, and files that constitute the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the internal view in a database?

A

Describes the structures of data records, the linkages between files, and the physical arrangement and sequence of records in a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the conceptual view in a database?

A

Describes the entire database, representing it logically and abstractly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What defines the user’s section of the database?

A

External View/User View (Subschema).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an ad hoc access methodology for extracting information from a database?

A

Query.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SQL?

A

IBM’s structured Query Language, a standard query language for both mainframe and microcomputer DBMSs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the responsibility of a Database Administrator (DBA)?

A

Managing the database resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a data dictionary do?

A

Describes every data element in the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two fundamental components of data structure?

A
  • Data Organization
  • Data Access Methods
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does data organization refer to?

A

The way records are physically arranged on the secondary storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the criteria that influence the selection of data structure?

A
  • Rapid file access and data retrieval
  • Efficient use of disk storage space
  • High throughput for transaction processing
  • Protection from data loss
  • Ease of recovery from system failure
  • Accommodation of file growth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a data model?

A

An abstract representation of the data about entities, including resources, transactions, and agents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an entity in database terminology?

A

Database representation of an individual resource, event, or agent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a one-to-many association?

A

For every occurrence in Record Type X, there are zero, one, or many occurrences in Record Type Y.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the three common DBMS models?

A
  • The Hierarchical Model
  • The Network Model
  • The Relational Model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What characterizes the Hierarchical Model?

A

Constructed of sets that describe the relationship between two linked files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a leaf in the Hierarchical Model?

A

The lowest file in a particular branch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a limitation of the Hierarchical Model?

A

No child record can have more than one parent.

25
What is the Network Model based on?
Explicit linkages between records and files.
26
What does the Relational Model portray data as?
Two-dimensional tables.
27
What is a primary key in a relational database?
An attribute that makes each row in the table unique.
28
What are the two categories of distributed databases?
* Partitioned databases * Replicated databases
29
What is a partitioned database?
It splits the central database into segments or partitions that are distributed to their primary users.
30
What is a deadlock in a distributed database environment?
A permanent condition where multiple sites lock out each other from the database.
31
What is one method for deadlock resolution?
Terminating one or more transactions to complete processing of the other transactions.
32
What is the purpose of concurrency control?
To ensure that transactions processed at each site are accurately reflected in the databases of all other sites.
33
What are access controls in a data management system?
Designed to prevent unauthorized individuals from viewing, retrieving, corrupting, or destroying the entity’s data.
34
What is a user view or subschema?
A subset of the total database that defines the user’s data domain and provides access to the database.
35
What is the function of a database authorization table?
Contains rules that limit the actions a user can take.
36
What is data encryption?
Procedures to protect highly sensitive stored data, making it unreadable to an intruder.
37
What are biometric devices used for in data management systems?
To measure personal characteristics for user identification.
38
What are inference controls?
Used to preserve the confidentiality and integrity of the database.
39
What should an auditor verify regarding authority tables?
That database administration personnel retain exclusive responsibility for creating authority tables.
40
What is the GPC Backup Technique?
A backup technique employed for data recovery.
41
What is the purpose of database query controls?
To prevent unauthorized access via inference.
42
How can an auditor test database query controls?
By simulating access by a sample of users and attempting to retrieve unauthorized data via inference queries.
43
What should the auditor verify about encryption controls?
Sensitive data, such as passwords, are properly encrypted.
44
What is the purpose of backup controls?
To recover from destruction and corruption of data.
45
What factors influence the number of backup master files needed?
* Financial significance of the system * Degree of file activity
46
What is the GPC Backup Technique?
A backup technique used in sequential file batch systems, producing generations of backup files.
47
In the GPC Backup Technique, what happens to the original parent file?
It becomes the backup (grandparent) file.
48
What is destructive replacement in direct access files?
Data values in direct access files are changed in place.
49
When should backup procedures occur in a real-time processing system?
At specified intervals throughout the day.
50
When are backup procedures typically scheduled in a batch processing system?
Prior to the update process.
51
Why should backup files be stored off-site?
As an added safeguard.
52
What is the audit objective relating to flat-file backup?
To verify that backup controls protect data files from physical damage, loss, accidental erasure, and data corruption.
53
What should the auditor verify about transaction files?
That they are retained for reconstructing master files.
54
What is the purpose of the transaction log feature?
To provide an audit trail of all processed transactions.
55
What does the checkpoint feature do?
Suspends all data processing while reconciling the transaction log and the database change log.
56
What is the function of the recovery module?
Uses logs and backup files to restart the system after a failure.
57
What should the auditor verify regarding backup routines?
That backup is performed routinely and frequently to facilitate recovery without excessive reprocessing.
58
Fill in the blank: The backup feature makes a periodic backup of the entire _______.
[database]
59
True or False: Backup policy should prioritize convenience over business disruption.
False