Exam 7: Databases in Applications
Exam 1: The Database Environment and Development Process119 Questions
Exam 2: Modeling Data in the Organization102 Questions
Exam 3: The Enhanced E-R Model102 Questions
Exam 4: Logical Database Design and the Relational Model101 Questions
Exam 5: Introduction to SQL102 Questions
Exam 6: Advanced SQL95 Questions
Exam 7: Databases in Applications93 Questions
Exam 8: Physical Database Design and Database Infrastructure167 Questions
Exam 9: Data Warehousing and Data Integration150 Questions
Exam 10: Big Data Technologies69 Questions
Exam 11: Analytics and Its Implications32 Questions
Exam 12: Data and Database Administration With Focus on Data Quality66 Questions
Exam 13: Distributed Databases100 Questions
Exam 14: Object-Oriented Data Modeling104 Questions
Select questions type
A transaction is consistent if it always runs with the same amount of memory.
(True/False)
4.8/5
(34)
A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.
(Multiple Choice)
4.8/5
(41)
Client/server describes a networked computing model that distributes processes between computers that request services and computers that provide services.
(True/False)
4.8/5
(39)
Two-tier architectures are much more scalable than three-tier architectures.
(True/False)
4.8/5
(39)
Open Database Connectivity is an application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed.
(True/False)
4.8/5
(37)
Which of the following is NOT a common distribution logic for two-tiered server environments?
(Multiple Choice)
5.0/5
(34)
A client/server configuration that has three layers (one client and two servers) has a three-tier architecture.
(True/False)
4.9/5
(33)
All of the following are key components of a web application EXCEPT:
(Multiple Choice)
5.0/5
(33)
A computer that provides database storage and access in a client/server environment is called a(n):
(Multiple Choice)
4.7/5
(37)
Level of lock granularity is the extent of a database resource include with each lock.
(True/False)
4.8/5
(41)
Geolocation logic is the application logic component responsible for data storage and retrieval.
(True/False)
4.9/5
(36)
The storage component of a client/server architecture is responsible for data storage and retrieval from the physical storage devices associated with the application.
(True/False)
4.8/5
(40)
A(n) ________ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system.
(Multiple Choice)
4.8/5
(31)
All of the following are advantages of stored procedures EXCEPT:
(Multiple Choice)
4.8/5
(38)
A common encryption method to secure data traveling between a client and a server is called:
(Multiple Choice)
4.9/5
(34)
The role responsible for administering database security is:
(Multiple Choice)
4.7/5
(32)
Showing 21 - 40 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)