Exam 6: Database Administration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Transactions should be written to the log before they are applied to the database itself.

Free
(True/False)
4.8/5
(45)
Correct Answer:
Verified

True

Microsoft Access 2013 can secure databases by deploying databases packaged with a(n)________.

Free
(Short Answer)
4.7/5
(37)
Correct Answer:
Verified

digital signature

Rollback requires the use of logs,but rollforward does not.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

False

The term DBA refers to the:

(Multiple Choice)
4.9/5
(29)

Briefly define the three problems that can occur because of concurrent processing that are addressed by resource locking.

(Essay)
4.9/5
(30)

Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the database in case of failure and to recover it as quickly and accurately as possible when necessary.

(Short Answer)
4.8/5
(36)

Microsoft Access 2013 uses a user-level security system.

(True/False)
4.9/5
(37)

Microsoft Access 2013 databases cannot be secured by password encryption.

(True/False)
4.9/5
(39)

A dirty read is a problem with concurrent processing when a transaction rereads data it has already read and finds modifications or deletions caused by another transaction.

(True/False)
4.7/5
(27)

In comparison to reprocessing,rollforward does not involve the application programs.

(True/False)
4.8/5
(32)

When Microsoft Access 2013 compiles VBA code in a database,the database file will be a(n):

(Multiple Choice)
4.8/5
(30)

An ACID transaction is one that is:

(Multiple Choice)
4.8/5
(38)

________ is an important business function whose purpose is to manage the database to maximize its value to the organization.

(Short Answer)
4.7/5
(31)

Computer systems fail for which of the following reasons?

(Multiple Choice)
4.9/5
(44)

What is the difference between authentication and authorization?

(Essay)
4.9/5
(38)

Microsoft Access 2013 databases can be secured by deploying databases packaged with digital signatures.

(True/False)
4.8/5
(38)

Distinguish between statement-level consistency and transaction-level consistency.

(Essay)
4.8/5
(41)

In terms of database security,a user can be assigned many roles,and a role can be assigned to many users.

(True/False)
4.7/5
(33)

A point of synchronization between the database and the transaction log is called a(n):

(Multiple Choice)
4.8/5
(30)

What is the least restrictive isolation level that will prevent dirty reads?

(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)