Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Harvard University AUDIT 111 Chapter 4-IT Security Part II: Auditing Database Systems TRUE/FALSE 1)The database approach to data management is sometimes called the flat file approach

Harvard University AUDIT 111 Chapter 4-IT Security Part II: Auditing Database Systems TRUE/FALSE 1)The database approach to data management is sometimes called the flat file approach

Business

Harvard University

AUDIT 111

Chapter 4-IT Security Part II: Auditing Database Systems

TRUE/FALSE

1)The database approach to data management is sometimes called the flat file approach.

 

                                          

 

  1. The database management system provides a controlled environment for accessing the database.

 

                                          

 

  1. To the user, data processing procedures for routine transactions, such as entering sales orders, appear to be identical in the database environment and in the traditional environment.

 

                                          

 

  1. An important feature associated with the traditional approach to data management is the ability to produce ad hoc reports.

 

                                          

 

  1. The data definition language is used to insert special database commands into application programs.

 

                                          

 

  1. There is more than one conceptual view of the database.

 

                                          

 

  1. In the database method of data management, access authority is maintained by systems programming.

 

                                          

 

  1. The physical database is an abstract representation of the database.

 

                                          

 

  1. A customer name and an unpaid balance is an example of a one-to-many relationship.

 

                                          

 

  1. In the relational model, a data element is called a relation.

 

                                          

 

  1. Subschemas are used to authorize user access privileges to specific data elements.

 

                                          

 

  1. A recovery module suspends all data processing while the system reconciles its journal files against the database.

 

                                          

 

  1. The database management system controls access to program files.

 

                                          

 

  1. Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating sub- schemas.

 

                                          

 

  1. Data normalization groups data attributes into tables in accordance with specific design objectives.

 

                                          

 

  1. Under the database approach, data is viewed as proprietary or owned by users.

 

                                          

 

  1. The data dictionary describes all of the data elements in the database.

 

                                          

 

  1. A join builds a new table by creating links.

 

                                          

 

  1. A deadlock is a phenomenon that prevents the processing of transactions.

 

                                          

 

  1. Timestamping is a control that is used to ensure database partitioning.

 

                                          

 

  1. A lockout is a software control that prevents multiple users from simultaneous access

to data.

 

                                          

 

  1. An entity is any physical thing about which the organization wishes to capture data.

 

                                          

 

  1. An ER diagram is a graphical representation of a data model.

 

                                          

 

  1. The term occurrence is used to describe the number of attributes or fields pertaining to a specific entity.

 

                                          

 

  1. Cardinality describes the number of possible occurrences in one table that are associated with a single occurrence in a related table.

 

                                          

 

 

 

 

 

 

MULTIPLE CHOICE

 

  1. All of the following are basic data management tasks except

a.

data deletion

b.

data storage

c.

data attribution

d.

data retrieval

                                          

 

  1. The task of searching the database to locate a stored record for processing is called

a.

data deletion

b.

data storage

c.

data attribution

d.

data retrieval

                                          

 

  1. Which of the following is not a problem usually associated with the flat-file approach to data management?

a.

data redundancy

b.

restricting access to data to the primary user

c.

data storage

d.

currency of information

                                          

 

  1. Which characteristic is associated with the database approach to data management?

a.

data sharing

b.

multiple storage procedures

c.

data redundancy

d.

excessive storage costs

                                          

 

  1. Which characteristic is not associated with the database approach to data management?

a.

the ability to process data without the help of a programmer

b.

the ability to control access to the data

c.

constant production of backups

d.

the inability to determine what data is available

                                          

 

  1. The textbook refers to four interrelated components of the database concept. Which of the following is not one of the components?

a.

the database management system

b.

the database sdministrator

c.

the physical database

d.

the conceptual database

                                          

 

  1. Which of the following is not a responsibility of the database management system?

a.

provide an interface between the users and the physical database

b.

provide security against a natural disaster

c.

ensure that the internal schema and external schema are consistent

d.

authorize access to portions of the database

                                          

 

  1. A description of the physical arrangement of records in the database is

a.

the internal view

b.

the conceptual view

c.

the subschema

d.

the external view

                                          

 

  1. Which of the following may provide many distinct views of the database?

a.

the schema

b.

the internal view

c.

the user view

d.

the conceptual view

                                          

 

  1. Users access the database

a.

by direct query

b.

by developing operating software

c.

by constantly interacting with systems programmers

d.

all of the above

                                          

 

  1. The data definition language

a.

identifies, for the database management system, the names and relationships of all data elements, records, and files that comprise the database

b.

inserts database commands into application programs to enable standard programs to interact with and manipulate the database

 

c.

permits users to process data in the database without the need for conventional programs

d.

describes every data element in the database

                                          

 

  1. The data manipulation language

a.

defines the database to the database management system

b.

transfers data to the buffer area for manipulation

c.

enables application programs to interact with and manipulate the database

d.

describes every data element in the database

                                          

 

  1. Which statement is not correct? A query language like SQL

a.

is written in a fourth-generation language

b.

requires user familiarity with COBOL

c.

allows users to retrieve and modify data

d.

reduces reliance on programmers

                                          

 

  1. Which duty is not the responsibility of the database administrator?

a.

to develop and maintain the data dictionary

b.

to implement security controls

c.

to design application programs

d.

to design the subschema

                                          

 

  1. In a hierarchical model

a.

links between related records are implicit

b.

the way to access data is by following a predefined data path

c.

an owner (parent) record may own just one member (child) record

d.

a member (child) record may have more than one owner (parent)

                                          

 

  1. Which term is not associated with the relational database model?

a.

tuple

b.

attribute

c.

collision

d.

relation

                                          

 

 

 

  1. In the relational database model

a.

relationships are explicit

b.

the user perceives that files are linked using pointers

c.

data is represented on two-dimensional tables

d.

data is represented as a tree structure

                                          

 

  1. In the relational database model all of the following are true except

 

a.

data is presented to users as tables

b.

data can be extracted from specified rows from specified tables

c.

a new table can be built by joining two tables

d.

only one-to-many relationships can be supported

                                          

 

  1. In a relational database

a.

the user’s view of the physical database is the same as the physical database

b.

users perceive that they are manipulating a single table

c.

a virtual table exists in the form of rows and columns of a table stored on the disk

d.

a programming language (COBOL) is used to create a user’s view of the database

                                          

 

  1. Which of the following is not a common form of conceptual database model?

a.

hierarchical

b.

network

c.

sequential

d.

relational

                                          

 

  1. Which statement is false?

a.

The DBMS is special software that is programmed to know which data elements each user is authorized to access.

b.

User programs send requests for data to the DBMS.

c.

During processing, the DBMS periodically makes backup copies of the physical database.

d.

The DBMS does not control access to the database.

                                          

 

  1. All of the following are elements of the DBMS which facilitate user access to the database except

a.

query language

b.

data access language

c.

data manipulation language

d.

data definition language

                                          

 

  1. Which of the following is a level of the database that is defined by the data definition language?

a.

user view

b.

schema

c.

internal view

d.

all are levels or views of the database

                                          

 

  1. An example of a distributed database is

a.

partitioned database

b.

centralized database

c.

networked database

d.

all are examples of distributed databases

 

                                          

 

  1. Data currency is preserved in a centralized database by

a.

partitioning the database

b.

using a lockout procedure

c.

replicating the database

d.

implementing concurrency controls

                                          

 

  1. Which procedure will prevent two end users from accessing the same data element at the same time?

a.

data redundancy

b.

data replication

c.

data lockout

d.

none of the above

                                          

 

  1. The advantages of a partitioned database include all of the following except

a.

user control is enhanced

b.

data transmission volume is increased

c.

response time is improved

d.

risk of destruction of entire database is reduced

                                          

 

  1. A replicated database is appropriate when

a.

there is minimal data sharing among information processing units

b.

there exists a high degree of data sharing and no primary user

c.

there is no risk of the deadlock phenomenon

d.

most data sharing consists of read-write transactions

                                          

 

  1. What control maintains complete, current, and consistent data at all information processing units?

a.

deadlock control

b.

replication control

c.

concurrency control

d.

gateway control

                                          

 

  1. Data concurrency

a.

is a security issue in partitioned databases

b.

is implemented using timestamping

c.

may result in data lockout

d.

occurs when a deadlock is triggered

                                          

 

  1. All of the following are advantages of a partitioned database except

a.

increased user control by having the data stored locally

b.

deadlocks are eliminated

c.

transaction processing response time is improved

d.

partitioning can reduce losses in case of disaster

                                          

 

  1. Which backup technique is most appropriate for sequential batch systems?

a.

grandparent-parent-child approach

b.

staggered backup approach

c.

direct backup

d.

remote site, intermittent backup

                                          

 

  1. When creating and controlling backups for a sequential batch system,

a.

the number of backup versions retained depends on the amount of data in the file

b.

off-site backups are not required

c.

backup files can never be used for scratch files

d.

the more significant the data, the greater the number of backup versions

                                          

 

 

  1. In a direct access file system

a.

backups are created using the grandfather-father-son approach

b.

processing a transaction file against a maser file creates a backup file

c.

files are backed up immediately before an update run

d.

if the master file is destroyed, it cannot be reconstructed

                                          

 

  1. Which of the following is not an access control in a database system?

a.

antivirus software

b.

database authorization table

c.

passwords

d.

voice prints

                                          

 

 

 

  1. Which of the following is not a basic database backup and recovery feature?

 

a.

checkpoint

b.

backup database

c.

transaction log

d.

database authority table

                                          

 

 

  1. Audit objectives for the database management system include all of the following

except

a.

verifying that the security group monitors and reports on fault tolerance violations

b.

confirming that backup procedures are adequate

c.

ensuring that authorized users access only those files they need to perform their duties

d.

verifying that unauthorized users cannot access data files

                                          

 

  1. All of the following tests of controls will provide evidence that access to the data files is limited except

a.

inspecting biometric controls

b.

reconciling program version numbers

c.

comparing job descriptions with access privileges stored in the authority table

d.

attempting to retrieve unauthorized data via inference queries

                                          

 

 

  1. Which of the following is not a test of access controls?

a.

biometric controls

b.

encryption controls

c.

backup controls

d.

inference controls

                                          

 

 

  1. The database attributes that individual users have permission to access are defined in

a.

operating system.

b.

user manual.

c.

database schema.

d.

user view.

e.

application listing.

                                          

 

 

SHORT ANSWER

 

Use the following words to complete the sentences in questions 1 through 5.

 

database administrator

data dictionary

data redundancy

index sequential access method

query language

schema

sequential structure

subschema

 

  1.                                                               occurs when a specific file is reproduced for each user who needs access to the file.

 

  1. The conceptual view of the database is often called                                              .

 

  1. The                                                  allows users to retrieve and modify data easily.
  2. The                                                                 authorizes access to the database.

 

  1. The                                                                 describes every data element in the database.

 

  1. How does the database approach solve the problem of data redundancy?

 

 

 

 

  1. Describe two tests of controls that would provide evidence that the database management system is protected against unauthorized access attempts.

 

 

 

 

  1. What is a database authorization table?

 

 

 

 

  1. What are two types of distributed databases?

 

  1. Describe an environment in which a firm should use a partitioned database.

 

 

 

 

  1. Why are the hierarchical and network models called navigational databases?

 

 

 

 

  1. What is a database lockout?

 

 

 

 

  1. What is the partitioned database approach and what are its advantages?

 

 

 

 

  1. What is a replicated database and what are the advantages of this approach?

 

 

 

 

 

  1. What is a legacy system?

 

 

 

 

  1. What is the flat-file model?

 

 

 

 

 

  1. What are the four primary elements of the database approach?

 

 

 

 

  1. What types of problems does data redundancy cause?
  2. What flat-file data management problems are solved as a result of using the database concept?

 

 

 

  1. What are four ways in which database management systems provide a controlled environment to manage user access and the data resources?

 

 

  1. Explain the relationship between the three levels of the data definition language. As a user, which level would you be most interested in?

 

 

 

 

  1. What is the internal view of a database?

 

 

 

 

  1. What is DML?

 

 

 

  1. What is a data dictionary, and what purpose does it serve?

 

 

 

 

  1. Discuss and give an example of one-to-one, one-to-many, and many-to-many record associations.

 

 

 

 

 

 

 

 

 

 

 

 

ESSAY

 

 

  1. What are the four elements of the database approach? Explain the role of each.

 

 

 

 

 

  1. Explain the three views of a database.

 

 

 

  1. Explain a database lockout and the deadlock phenomenon. Contrast that to concurren- cy control and the timestamping technique. Describe the importance of these items in relation to database integrity.

 

 

 

 

  1. One purpose of a database system is the easy sharing of data. But this ease of sharing can also jeopardize security. Discuss at least three forms of access control designed to reduce this risk.

 

 

 

 

 

  1. In a distributed data processing system, a database can be centralized or distributed. What are the options? Explain.

 

 

 

 

 

 

  1. Ownership of data in traditional legacy systems often leads to data redundancy. This in turn leads to several data management problems. What are they? How does the database approach solve them?

 

 

 

 

  1. What services are provided by a database management system?

 

 

 

 

  1. Discuss the key factors to consider in determining how to partition a corporate database.

 

 

 

 

  1. Distinguish between a database lockout and a deadlock.

 

 

 

 

  1. Replicated databases create considerable data redundancy, which is in conflict with the database concept. Explain the justification of this approach.

 

 

 

 

  1. Contrast the navigational databases with relational databases. What is the primary advantage of the relational model?

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

15.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE