問題一覧
1
Data Administrator (DA)
2
Database Administrator (DBA)
3
Data Administrator (DA)
4
Database Administrator (DBA)
5
Facilitates the development and use of the database
6
Analyze and perform business data requirements
7
It refers to DBMS features and other related measures that comply with the organization’s security requirements.
8
It provides a basic syntax used to specify security restrictions. The DBMS will then implement the security system and enforce the required restrictions.
9
Users
10
Objects
11
Privileges
12
Roles
13
It is where setting up security begins with
14
It includes logins and server roles.
15
It include users and database roles.
16
It allows you to connect to the SQL Server service (also called an instance), and permissions inside the database are granted to the database users
17
CREATE LOGIN login_name_test WITH PASSWORD = 'Mypassword';
18
ALTER LOGIN login_name_test WITH NAME = newlogin_name;
19
ALTER LOGIN newlogin_name WITH PASSWORD = 'Newpassword';
20
GRANT
21
REVOKE
22
GRANT SELECT, UPDATE ON [Names] TO user1
23
REVOKE UPDATE ON [Names] TO user1
24
fixed-database roles
25
user-defined database roles
26
db_owner
27
db_securityadmin
28
db_accessadmin
29
db_backupoperator
30
db_ddladmin
31
db_datawriter
32
db_datareader
33
db_denydatawriter
34
db_denydatareader
35
ALTER ROLE db_owner ADD MEMBER user1
36
CREATE ROLE [Admin1] GO GRANT SELECT, UPDATE ON [Names] TO [Admin1] GO
37
Backup
38
Physical backups
39
Logical backups
40
Transaction log
41
Checkpoint
42
Backups must be clearly identified through detailed descriptions and date information, thus enabling the DBA to ensure that the correct backups are used to recover the database. Nowadays, the most common backup mediums are disk-based backup devices and cloud-based data storage.
43
Multiple backups of the same data are required, and each backup copy must be stored in a different location. The storage locations must include sites inside and outside the organization.
44
Protection might include the use of closed installations with restricted access, as well as preparation of the computer sites to provide air conditioning, backup power, and fire protection.
45
is caused by a careless end-user. Such errors include deleting the wrong rows from a table, pressing the wrong key on the keyboard, or shutting down the main database server by accident.
46
unintentional failure
47
Intentional events
48
This refers to the rate at which new data enters the system as well as the rate at which the data must be processed.
49
Big Data
50
Volume
51
Velocity
52
Variety
53
NoSQL DBMS
54
These are based on graph theory and represent data through nodes, edges, and properties
55
Key-value (KV) database
56
These are based on graph theory and represent data through nodes, edges, and properties.
57
These databases are conceptually similar to key-value databases, and they can almost be considered a subtype of KV databases.
58
All columns in one row are rarely needed at once, but there are groups of columns that are often read together.
59
It is based on graph theory and represent data through nodes, edges, and properties.
60
Database
61
Collections
62
Document
63
use FirstMongoDB
64
db
65
show dbs
66
db.student.insertMany([ {name: "John Smith"}, {name: "John Cedrick"} ])
67
db.student.find()
68
show collections
69
db.createCollection("Teacher")
70
db.student.remove({name: "John Cedrick"})
71
db.student.drop()
72
db.dropDatabase()
The Contemporary World Mock test (Prelims)
The Contemporary World Mock test (Prelims)
Xai Alexandrei Delos Reyes · 58問 · 2年前The Contemporary World Mock test (Prelims)
The Contemporary World Mock test (Prelims)
58問 • 2年前Computing Mock test (Prelims)
Computing Mock test (Prelims)
Xai Alexandrei Delos Reyes · 67問 · 2年前Computing Mock test (Prelims)
Computing Mock test (Prelims)
67問 • 2年前Programming Mock Test (Prelims)
Programming Mock Test (Prelims)
Xai Alexandrei Delos Reyes · 64問 · 2年前Programming Mock Test (Prelims)
Programming Mock Test (Prelims)
64問 • 2年前Entrepreneurship Mock Test (Prelims)
Entrepreneurship Mock Test (Prelims)
Xai Alexandrei Delos Reyes · 23問 · 2年前Entrepreneurship Mock Test (Prelims)
Entrepreneurship Mock Test (Prelims)
23問 • 2年前Computing Mock Test (Midterms) BSIT 107
Computing Mock Test (Midterms) BSIT 107
Xai Alexandrei Delos Reyes · 76問 · 2年前Computing Mock Test (Midterms) BSIT 107
Computing Mock Test (Midterms) BSIT 107
76問 • 2年前Math Mock Test (Prelims)
Math Mock Test (Prelims)
Xai Alexandrei Delos Reyes · 48問 · 2年前Math Mock Test (Prelims)
Math Mock Test (Prelims)
48問 • 2年前Programming Mock Test (Midterms) BSIT 107
Programming Mock Test (Midterms) BSIT 107
Xai Alexandrei Delos Reyes · 52問 · 2年前Programming Mock Test (Midterms) BSIT 107
Programming Mock Test (Midterms) BSIT 107
52問 • 2年前UTS Mock Test (Midterms) BSIT107
UTS Mock Test (Midterms) BSIT107
Xai Alexandrei Delos Reyes · 40問 · 2年前UTS Mock Test (Midterms) BSIT107
UTS Mock Test (Midterms) BSIT107
40問 • 2年前Entrepreneurship Mock Test (Midterms) BSIT 107
Entrepreneurship Mock Test (Midterms) BSIT 107
Xai Alexandrei Delos Reyes · 38問 · 2年前Entrepreneurship Mock Test (Midterms) BSIT 107
Entrepreneurship Mock Test (Midterms) BSIT 107
38問 • 2年前Contemporary World Mock Test (Midterms) BSIT 107
Contemporary World Mock Test (Midterms) BSIT 107
Xai Alexandrei Delos Reyes · 28問 · 2年前Contemporary World Mock Test (Midterms) BSIT 107
Contemporary World Mock Test (Midterms) BSIT 107
28問 • 2年前Math Mocktest (Midterms) BSIT 107
Math Mocktest (Midterms) BSIT 107
Xai Alexandrei Delos Reyes · 24問 · 2年前Math Mocktest (Midterms) BSIT 107
Math Mocktest (Midterms) BSIT 107
24問 • 2年前Computer Programming Mocktest (Pre-finals)
Computer Programming Mocktest (Pre-finals)
Xai Alexandrei Delos Reyes · 26問 · 2年前Computer Programming Mocktest (Pre-finals)
Computer Programming Mocktest (Pre-finals)
26問 • 2年前Math Mocktest (Pre-Finals)
Math Mocktest (Pre-Finals)
Xai Alexandrei Delos Reyes · 19問 · 2年前Math Mocktest (Pre-Finals)
Math Mocktest (Pre-Finals)
19問 • 2年前Computing Mock Test (Pre-finals)
Computing Mock Test (Pre-finals)
Xai Alexandrei Delos Reyes · 36問 · 2年前Computing Mock Test (Pre-finals)
Computing Mock Test (Pre-finals)
36問 • 2年前Computing Mock Test Finals
Computing Mock Test Finals
Xai Alexandrei Delos Reyes · 26問 · 2年前Computing Mock Test Finals
Computing Mock Test Finals
26問 • 2年前Comprog 2nd sem (prelims) BSIT 205
Comprog 2nd sem (prelims) BSIT 205
Xai Alexandrei Delos Reyes · 63問 · 1年前Comprog 2nd sem (prelims) BSIT 205
Comprog 2nd sem (prelims) BSIT 205
63問 • 1年前Discrete Math 2nd sem (prelims) BSIT 205
Discrete Math 2nd sem (prelims) BSIT 205
Xai Alexandrei Delos Reyes · 36問 · 1年前Discrete Math 2nd sem (prelims) BSIT 205
Discrete Math 2nd sem (prelims) BSIT 205
36問 • 1年前Art Appreciation (Prelim) BSIT 205
Art Appreciation (Prelim) BSIT 205
Xai Alexandrei Delos Reyes · 56問 · 1年前Art Appreciation (Prelim) BSIT 205
Art Appreciation (Prelim) BSIT 205
56問 • 1年前Ethics 2nd sem (Prelims) BSIT 205
Ethics 2nd sem (Prelims) BSIT 205
Xai Alexandrei Delos Reyes · 45問 · 1年前Ethics 2nd sem (Prelims) BSIT 205
Ethics 2nd sem (Prelims) BSIT 205
45問 • 1年前STS 2nd Sem (Prelim) BSIT 205
STS 2nd Sem (Prelim) BSIT 205
Xai Alexandrei Delos Reyes · 40問 · 1年前STS 2nd Sem (Prelim) BSIT 205
STS 2nd Sem (Prelim) BSIT 205
40問 • 1年前問題一覧
1
Data Administrator (DA)
2
Database Administrator (DBA)
3
Data Administrator (DA)
4
Database Administrator (DBA)
5
Facilitates the development and use of the database
6
Analyze and perform business data requirements
7
It refers to DBMS features and other related measures that comply with the organization’s security requirements.
8
It provides a basic syntax used to specify security restrictions. The DBMS will then implement the security system and enforce the required restrictions.
9
Users
10
Objects
11
Privileges
12
Roles
13
It is where setting up security begins with
14
It includes logins and server roles.
15
It include users and database roles.
16
It allows you to connect to the SQL Server service (also called an instance), and permissions inside the database are granted to the database users
17
CREATE LOGIN login_name_test WITH PASSWORD = 'Mypassword';
18
ALTER LOGIN login_name_test WITH NAME = newlogin_name;
19
ALTER LOGIN newlogin_name WITH PASSWORD = 'Newpassword';
20
GRANT
21
REVOKE
22
GRANT SELECT, UPDATE ON [Names] TO user1
23
REVOKE UPDATE ON [Names] TO user1
24
fixed-database roles
25
user-defined database roles
26
db_owner
27
db_securityadmin
28
db_accessadmin
29
db_backupoperator
30
db_ddladmin
31
db_datawriter
32
db_datareader
33
db_denydatawriter
34
db_denydatareader
35
ALTER ROLE db_owner ADD MEMBER user1
36
CREATE ROLE [Admin1] GO GRANT SELECT, UPDATE ON [Names] TO [Admin1] GO
37
Backup
38
Physical backups
39
Logical backups
40
Transaction log
41
Checkpoint
42
Backups must be clearly identified through detailed descriptions and date information, thus enabling the DBA to ensure that the correct backups are used to recover the database. Nowadays, the most common backup mediums are disk-based backup devices and cloud-based data storage.
43
Multiple backups of the same data are required, and each backup copy must be stored in a different location. The storage locations must include sites inside and outside the organization.
44
Protection might include the use of closed installations with restricted access, as well as preparation of the computer sites to provide air conditioning, backup power, and fire protection.
45
is caused by a careless end-user. Such errors include deleting the wrong rows from a table, pressing the wrong key on the keyboard, or shutting down the main database server by accident.
46
unintentional failure
47
Intentional events
48
This refers to the rate at which new data enters the system as well as the rate at which the data must be processed.
49
Big Data
50
Volume
51
Velocity
52
Variety
53
NoSQL DBMS
54
These are based on graph theory and represent data through nodes, edges, and properties
55
Key-value (KV) database
56
These are based on graph theory and represent data through nodes, edges, and properties.
57
These databases are conceptually similar to key-value databases, and they can almost be considered a subtype of KV databases.
58
All columns in one row are rarely needed at once, but there are groups of columns that are often read together.
59
It is based on graph theory and represent data through nodes, edges, and properties.
60
Database
61
Collections
62
Document
63
use FirstMongoDB
64
db
65
show dbs
66
db.student.insertMany([ {name: "John Smith"}, {name: "John Cedrick"} ])
67
db.student.find()
68
show collections
69
db.createCollection("Teacher")
70
db.student.remove({name: "John Cedrick"})
71
db.student.drop()
72
db.dropDatabase()