0% found this document useful (0 votes)
179 views3 pages

LESSON 1 Assessment Guide Questions

This document discusses the roles of data administration and database administration. It defines their purposes and associated tasks. Data administration focuses on data modeling, requirements gathering, and policy development. Database administration focuses on installation, upgrades, performance, backups and security. Their roles in business are changing, with data administrators focusing more on data policies, standards and information management, while database administrators focus on installation, upgrades, security and integrity. The document also lists some common database threats like theft, fraud, human error and loss of privacy/confidentiality and describes controls to counter each threat, such as physical security, operating procedures, and security arrangements.

Uploaded by

Ace Flores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
179 views3 pages

LESSON 1 Assessment Guide Questions

This document discusses the roles of data administration and database administration. It defines their purposes and associated tasks. Data administration focuses on data modeling, requirements gathering, and policy development. Database administration focuses on installation, upgrades, performance, backups and security. Their roles in business are changing, with data administrators focusing more on data policies, standards and information management, while database administrators focus on installation, upgrades, security and integrity. The document also lists some common database threats like theft, fraud, human error and loss of privacy/confidentiality and describes controls to counter each threat, such as physical security, operating procedures, and security arrangements.

Uploaded by

Ace Flores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Rhoel T.

Bayle Jr BSIT 2 -
1

Guide Questions:
1. Indicate whether data administration or database administration is typically
responsible for each of the following functions:
Data Administration a. Managing the data repository
Database Administration b. Installing and upgrading the DBMS
Data Administration c. Conceptual data modeling
Database Administration d. Managing data security and privacy
Data Administration e. Database planning
Database Administration f. Tuning database performance
Database Administration g. Database backup and recovery

2.Define the purpose and tasks associated with data administration and database
administration.
Data Administration:
 Selecting appropriate productivity tools.
 Assisting in the development of the corporate IT/IS and enterprise strategies.
 Undertaking feasibility studies and planning for database development.
 Developing a corporate data model.
 Determining the organization’s data requirements.
 Undertaking conceptual and logical database design.
 Developing a security policy.
Database Administration:
 Evaluating and selecting DBMS products.
 Undertaking physical database design.
 Implementing a physical database design using a target DBMS.
 Defining security and integrity constraints.
 Liaising with database application developers.
 Performing backups routinely.
 Ensuring recovery mechanisms and procedures are in place.
3.Describe the changing roles of a data administrator and database administrator in the
current business environment.
Data Administrator: Data policies, procedures, standards
Data policies are statements that make explicit the goals of data administration, such as
“Every user must have a valid password.”
Managing the information repository
Database management systems, which maintain the repository and update system
privileges, passwords, object definitions.
Database Administrator: Installing/upgrading DBMS
A DBMS installation is a process of making sure all the correct versions of different
modules are in place, all the proper device drivers are present, and the DBMS works
correctly with any third-party software products.
Managing data security, privacy, and integrity
Protecting the security, privacy, and integrity of organizational databases rests with the
database administration function.
4.List the main types of threat that could affect a database system, and for each
describe the controls that you would use to counteract each of them.
Theft and fraud
These activities are going to be perpetrated by people, possibly through electronic
means, and may or alter data. Physical security must be established so that
unauthorized persons are unable to gain access to rooms where computers, servers,
telecommunications facilities, or computer files are located.
Accidental losses, including human error, software, and hardware-caused
breaches
Creating operating procedures such as user authorization, uniform software installation
procedures, and hardware maintenance schedules are examples of actions that may be
taken to address threats from accidental losses
Loss of privacy or confidentiality
To avoid this threat case, make appropriate security arrangements for the storage and
transmission of personal information. Obtain and record professional advice given prior
to connecting to a network.

You might also like