Information Technology > EXAM REVIEW > MIS 564 WEEK 7 FINAL EXAM PRACTICE 1 WITH ALL THE ANSWERS UPDATED (2020). (All)
A reference repository that holds metadata about all the databases, their component parts, the data in the databases, and the security details. 2.(CO A) Responsible for data strategy, information a... rchitecture, and establishing the policies and procedures used by an entire organization for its data use and management. 3. (CO A) Responsible for the development and day-to-day administration and maintenance of a database. 4. (CO A) Responsible for the efficiency and optimization, access rights, and monitoring of a specific database, as well as participating in the DDLC for new databases. 5.(CO A) An organization where the DA reports to a project manager and a data administration manager. 6.(CO A) Between a DA and a DBA, excellent communication skills are critical for which position? 7.(CO A) The DDLC is what and composed of what states? 8.(CO D) A query language used to locate and retrieve nodes in an XML document: 9.(CO D) XSL is comprised of what three parts? 10.(CO D) An XML based web feed used to publish dynamic material 11.(CO D) A database management system optimized to store, retrieve, and update XML documents natively: 12.(CO D) A language used to describe another language 13.(CO D) Embeds information about the data it holds in a hierarchical format which is self describing. 14.(CO D) A closed markup language used to render data on a web browser. 15.(CO D) Embeds XML file that associates a namespace with an XML document and describes the legal format, structure, content, and semantics of the document. 16.(CO F) Techniques and technologies used to exploit large data stores in order to support decision making 17.(CO F) OLAP 18.(CO F) The two approaches that are used to exploit a datastore 19. (CO F) A RDBMS where the multidimensional model is imposed on a relational model. 20.(CO F) Name two ROLAP schemas. 21.(CO F) The five data mining functions include: 22.(CO F) An exchange of information, or conversation, between two applications is called 23.(CO F) A computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network. 24.(CO F) A small data item stored on the user’s computer by a web browser used for session tracking, authentication, storing site preferences, etc. 25.(CO F) An application that manages the content of a website, including concurrent updates, imposing format consistency, and content versioning. 26.(CO F) A web application is an example of what kind of architecture? 27.(CO F) Name at least 3 web browser-to-DBMS server connectivity tools. 28.(CO A) Domain 29.(CO A) Primary Key 30.(CO A) List the Relational Algebra Operators 31.(CO A) A Join is 32.(CO A) The SQL Constraints are 33. (CO A) A View 34. (CO A) NULL 35. (CO A) What are the SQL Security Commands? 36.(CO B) File servers, DBMS servers, 2-tiered, and 3-tiered are examples of 37.(CO B) Super computers are used in which architecture? 38.(CO B) A Distributed Database 39. (CO B) Distributed Database Fragmentation techniques 40. (CO B) Replication database 41.(CO D) What is a TPS? 42.(CO D) What are the desirable corporate data attributes? (Sharable, transportable, secure, accurate, timely, and relevant) 43.(CO D) An Attribute 44.(CO D) An Entity 45.(CO D) Four building blocks of a data model: 46.(CO D) Data Modeling 47. (CO D) Describe the cardinality relationships. 48. (CO D) A Generalization 49.(CO D) Functional Dependency 50.(CO D) A relation is in 2-NF if, 51.(CO D) A relation is in 3-NF if, 52.(CO D) Goals of Normalization 53.(CO E) The transaction manager 54.(CO E) Used to solve concurrency issues 55.(CO E) When 2 users lock resources needed by each other so neither can progress it is called 56.(CO E) The 4 primary attributes a DBMS Transaction Manager enforces for any transaction 57.(CO E) When an outcome is determined by the sequence or timing of events instead of deterministic processing, it is called a 58. (CO E) A recovery procedure which backs out unwanted change in a database is called 59.(CO E) A recovery procedure which uses a prior saved database state and applies after image records from update transactions 60. (CO E) Verifying a user is who they say they are is 61. (CO E) Authorization is 62. (CO G) What managers are involved in database access? 63. (CO G) An attribute used to narrow down the search space when accessing a row with a specific value for the attribute. 64.(CO G) When we access the disk, we are accessing what kind of memory? 65. (CO G) An index structure that is efficient for both sequential and direct file access is 66. (CO G) A standard format used to represent written text in many different languages 67.(CO G) A redundant array of independent disks 68. (CO G) Which RAID levels are not good for applications with heavy update requirements? 69.(CO G) What technique uses a function to convert a field into an address to promote direct accessing? [Show More]
Last updated: 2 years ago
Preview 1 out of 9 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 27, 2020
Number of pages
9
Written in
This document has been written for:
Uploaded
Aug 27, 2020
Downloads
0
Views
156
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·