Exam 6: Database Administration
Exam 1: Getting Started76 Questions
Exam 2: The Relational Model87 Questions
Exam 3: Structured Query Language96 Questions
Exam 4: Data Modeling and the Entity Relationship Model76 Questions
Exam 5: Database Design81 Questions
Exam 6: Database Administration76 Questions
Exam 7: Database Processing Applications82 Questions
Exam 8: Big Data Data Warehouses and Business Intelligence Systems99 Questions
Exam 9: Getting Started With Microsoft Sql Server 2014 Express Edition40 Questions
Exam 10: Getting Started With Oracle Database Express Edition 11g Release 243 Questions
Exam 11: Getting Started With Mysql 5.6 Community Server71 Questions
Exam 12: Sql Views SQL/PSM and Importing Data70 Questions
Exam 13: Getting Started in Systems Analysis and Design47 Questions
Exam 14: Getting Started With Microsoft Visio 201334 Questions
Exam 15: the Access Workbench section H Microsoft Access 2013 Switchboards17 Questions
Exam 16: Getting Started With Web Servers, Php, and the Net beans IDE35 Questions
Exam 17: Business Intelligence Systems98 Questions
Exam 18: Big Data77 Questions
Select questions type
Transactions should be written to the log before they are applied to the database itself.
Free
(True/False)
4.8/5
(45)
Correct Answer:
True
Microsoft Access 2013 can secure databases by deploying databases packaged with a(n)________.
Free
(Short Answer)
4.7/5
(37)
Correct Answer:
digital signature
Rollback requires the use of logs,but rollforward does not.
Free
(True/False)
4.8/5
(37)
Correct Answer:
False
Briefly define the three problems that can occur because of concurrent processing that are addressed by resource locking.
(Essay)
4.9/5
(30)
Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the database in case of failure and to recover it as quickly and accurately as possible when necessary.
(Short Answer)
4.8/5
(36)
Microsoft Access 2013 databases cannot be secured by password encryption.
(True/False)
4.9/5
(39)
A dirty read is a problem with concurrent processing when a transaction rereads data it has already read and finds modifications or deletions caused by another transaction.
(True/False)
4.7/5
(27)
In comparison to reprocessing,rollforward does not involve the application programs.
(True/False)
4.8/5
(32)
When Microsoft Access 2013 compiles VBA code in a database,the database file will be a(n):
(Multiple Choice)
4.8/5
(30)
________ is an important business function whose purpose is to manage the database to maximize its value to the organization.
(Short Answer)
4.7/5
(31)
Microsoft Access 2013 databases can be secured by deploying databases packaged with digital signatures.
(True/False)
4.8/5
(38)
Distinguish between statement-level consistency and transaction-level consistency.
(Essay)
4.8/5
(41)
In terms of database security,a user can be assigned many roles,and a role can be assigned to many users.
(True/False)
4.7/5
(33)
A point of synchronization between the database and the transaction log is called a(n):
(Multiple Choice)
4.8/5
(30)
What is the least restrictive isolation level that will prevent dirty reads?
(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)