DBMS Chapter 9

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

The maintenance and evolution phase of the Database Life Cycle (DBLC) involves ______.

Introducing changes

2
New cards

The implementation and loading phase of the Database Life Cycle (DBLC) involves ______.

Installing the DBMS.

3
New cards

Coding, testing, and debugging are part of the ______ phase of the Systems Development Life Cycle (SDLC).

Implementation

4
New cards

Which of the following is a hardware-induced database failure?

Memory chip errors

5
New cards

Producing the required information flow is part of the ______ phase of the Database Life Cycle (DBLC).

Operation

6
New cards

The first step in developing the conceptual model using ER diagrams is to ______.

Identify, analyze, and refine the business rules.

7
New cards

In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transaction-processing requirements in ______.

Data analysis and requirements

8
New cards

In DBLC, the phase after the database initial study is ______.

Database design

9
New cards

The logical systems design is created during the ______ phase of the Systems Development Life Cycle (SDLC).

Analysis

10
New cards

______ is the process of determining the data storage organization and data characteristics of the database to ensure its integrity, security, and performance.

Physical design

11
New cards

Once the data has been loaded into the database, the ______ tests and fine-tunes the database for performance, integrity, concurrent access, and security constraints.

Database Administrator

12
New cards

During decentralized design, after the _____ has been completed, all modules are integrated into one conceptual model.

Verification process

13
New cards

_____ can render data useless to unauthorized users who might have violated some of the database security layers.

Data encryption

14
New cards

In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy is _____.

Distributed database design

15
New cards

The process of creating an information system is known as _____.

Systems development

16
New cards

Selecting database management system (DBMS) software is part of the _____ phase of the Database Life Cycle (DBLC).

Database design

17
New cards

The first step in the ER model verification process is to _____.

Identify the ER model's central entity

18
New cards

_____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources.

Virtualization

19
New cards

In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up.

Differential backup

20
New cards

The implementation of _____ applications tends to prolong the operational life of systems by making them easier to update and maintain.

CASE-produced

21
New cards

Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC).

Analysis

22
New cards

"Should the existing system be replaced?" is a question that is asked during the _____ stage of the Systems Development Life Cycle (SDLC).

Planning

23
New cards

The last step in the Database Life Cycle (DBLC) is _____.

Maintenance and evolution

24
New cards

The feasibility study during the planning phase of the Systems Development Life Cycle (SDLC) must address the:

Technical aspects of hardware and software requirements.

25
New cards

The database contents are loaded during the _____ phase of the Systems Development Life Cycle (SDLC).

Implementation