A ____ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.
____ management defines procedures to protect and guarantee database security and integrity.
A ____ is a named collection of settings that control how much of the database resource a given user can use.
deliver the data necessary for tactical decisions and planning
At the level of middle management, the database must be able to ____.
to support managerial decision making
Whatever the type of organization, the database's predominant role is ____.
The ____ administrator is responsible for providing a global and comprehensive administrative strategy for all of the organization's data.
____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.
establish DBMS performance goals
To carry out the performance-monitoring and tuning tasks, the DBA must first ____.
When introducing a database into an organization, a(n) ____ impact is likely because the database approach creates a more controlled and structured information flow.
control and planning
As a manager, the DBA must concentrate on the ____ dimensions of the database administration function.
There are no records in the form of SQL scripts to document the creation of the database.
What is a disadvantage of using a graphical tool such as the Oracle Configuration Assistant to create a database?
The database ____ must provide testing and evaluation services for all the database and end user applications.
A(n) ____ is a set of instructions generated at application completion time that predetermines how the application will access the database at run time.
____ management includes all DBA activities designed to secure data availability following a physical disaster or a database integrity failure.
____ is the process that "listens to" and processes the end-user connection requests over the network.
The person responsible for the control of the centralized and shared database is the database ____.
____ are written instructions that describe a series of steps to be followed during the performance of a given activity
The ____ rationale is simple: business data types tend to remain fairly stable and do not change much during their existence.
Using the Oracle Database Configuration Assistant, it is simple to create a database. The DBA uses a ____ interface to answer a series of questions to establish the parameters for the database to be created.
Although no current standard exists, it is common practice to define the DBA function by dividing the DBA operations according to the ____ phases.
The DBA's ____ role is focused on personnel management and on interactions with the end user community
In the old, decentralized world of the file system, the ____ department's task was to pool all computer resources to support all departments at the operational level.
____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data
Several DBMS packages contain features that allow the creation of a(n) ____, which automatically records a brief description of the database operations performed by all users.
electronic personnel badges
Some common physical security practices found in large database installations include: secured entrances, password-protected workstations, ____, closed-circuit video, and voice recognition technology.
provide access to external and internal data to identify growth opportunities and to chart the direction of such growth
At the level of top management, the database must be able to ____.