An entity ____ might be viewed as a separate entity by one or more departments.
subtype
synonym
homonym
conflict
Maintenance and enhancement are part of the ____ phase of the SDLC.
planning
maintenance
detailed systems design
implementation
____ are usually provided by the DBMS to check for access violations.
Access rights
Diskless workstations
Security devices
Audit trails
The assignment of ____ may restrict operations on predetermined objects such as databases, tables, views, queries and reports.
diskless workstations
password security
access rights
audit trails
The initial assessment and feasibility study are part of the SDLC's ____ phase.
planning
analysis
detailed systems design
implementation
The user requirements, existing system evaluation, and logical system design are part of the ____ phase of the SDLC.
planning
analysis
detailed systems design
implementation
The detailed system specification is part of the ____ phase of the SDLC.
planning
analysis
detailed systems design
implementation
____ design is likely to be employed when the problem itself is spread across several operational sites and each element is a subset of the entire data set.
Normalized
Denormalized
Decentralized
Centralized
The implementation of ____-produced applications tends to prolong the operational life of systems by making them easier to update and maintain.
database
network
CASE
design
____ can be used to render data useless to unauthorized users who might have violated some of the database security layers.
Data encryption
Diskless workstations
Access rights
Audit trails
____ design is productive when the data component is composed of a relatively small number of objects and procedures.
Normalized
Denormalized
Decentralized
Centralized
The logical systems design is created during the ____ phase of the SDLC.
planning
analysis
implementation
maintenance
____ design first identifies the data elements (items), then groups them together in data sets.
Top-down
Bottom-up
Analysis
Conceptual
The database initial study phase of the DBLC involves ____.
defining objectives
introducing changes
testing the database
installing the DBMS
Once the data have been loaded into the database, the ____ tests and fine-tunes the database for performance, integrity, concurrent access and security constraints.
programmer
manager
database administrator
systems administrator
A ____ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.
user
role
profile
manager
The DBA's ____ role covers activities involving the use of the DBMS.
administrative
arbitration
technical
managerial
____ are general statements of direction or action that communicate and support DBA goals.
Standards
Policies
Documentation
Procedures
A way of identifying the user and verifying that the user is allowed to access some restricted data or application is through _________________.
user authentication
policies and procedures
data encryption
audit trails
The ____ administrator is responsible for providing a global and comprehensive administrative strategy for all of the organization's data.