PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following steps will you take to accomplish the task?

You work as a Database Designer for SoftTech Inc. You have developed the conceptual design of the
database of an organization. Following is the ER-diagram, which you have designed. Now you have to convert
the following diagram to a logical model.

Which of the following steps will you take to accomplish the task? Each correct answer represents a part of the
solution. Choose all that apply.

What is the relationshipbetween regional center and study center?

Consider the case of a distance education university. The university has many regional centers across the
country. Each regional center has a head known as regional manager. Each regional center has allotted more
than one study center in its region. Each regional center has a region code, which is unique and specifies a
region. Each study center also has a study center code, which is also unique. What is the relationshipbetween
regional center and study center?

What should you do?

You work as the Database Administrator for www.company.com.com. All servers on the www.company.com.
com network run Windows Server 2003 and Windows Server 2000, and all client computers run Windows XP
rofessional and Windows Vista. The www.company.com.com network area consists of a single Active Directory
domain named www.company.com.com. The www.company.com.com network contains a Microsoft SQL
Server 2005 database server named COMPANY-DB111, which you administer at a regular interval of time.
COMPANY-DB111 contains and hosts three databases that support different types of business requirements.
The network uses the DBA database that supports internal operations including maintaining data, accounting,
and mailing. The network’s regular users make use of stored procedures for the data values that need insertion
into the tables. The stored procedures used in the network of the company are designed to access SQL variant
type parameters and then use the values to build and execute ad hoc query statements that are the partof the
SQL statements. During a routine network check, youdiscover that there are several odd occurrences inthe
database. The odd occurrences include data deleted from tables and other unauthorized activity. You suspect
a user is executing the unauthorized statements through the stored procedures. You are required to stop the
unauthorized changes while having least impact on the stored procedures that are in use. Your explanation
must use the least administrative effort.
What should you do?