Exam 6: Database Administration
Exam 1: Getting Started76 Questions
Exam 2: The Relational Model87 Questions
Exam 3: Structured Query Language96 Questions
Exam 4: Data Modeling and the Entity Relationship Model76 Questions
Exam 5: Database Design81 Questions
Exam 6: Database Administration76 Questions
Exam 7: Database Processing Applications82 Questions
Exam 8: Big Data Data Warehouses and Business Intelligence Systems99 Questions
Exam 9: Getting Started With Microsoft Sql Server 2014 Express Edition40 Questions
Exam 10: Getting Started With Oracle Database Express Edition 11g Release 243 Questions
Exam 11: Getting Started With Mysql 5.6 Community Server71 Questions
Exam 12: Sql Views SQL/PSM and Importing Data70 Questions
Exam 13: Getting Started in Systems Analysis and Design47 Questions
Exam 14: Getting Started With Microsoft Visio 201334 Questions
Exam 15: the Access Workbench section H Microsoft Access 2013 Switchboards17 Questions
Exam 16: Getting Started With Web Servers, Php, and the Net beans IDE35 Questions
Exam 17: Business Intelligence Systems98 Questions
Exam 18: Big Data77 Questions
Select questions type
When Microsoft Access 2013 secures a database just by storing the database in a trusted location,the database file will be a(n):
(Multiple Choice)
4.8/5
(36)
With optimistic locking,locks are first issued,then the transaction is processed,and then the locks are released.
(True/False)
5.0/5
(22)
What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database?
(Multiple Choice)
4.8/5
(24)
Breaking hardware,power outages,and human mistakes are all reasons that ________.
(Short Answer)
4.9/5
(34)
What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a different transaction since the prior read?
(Multiple Choice)
4.7/5
(42)
Lock granularity refers to whether a lock is placed by the DBMS automatically or is placed by a command from the application program.
(True/False)
4.8/5
(31)
Generally,the more restrictive the transaction isolation level,the less the throughput of database processing.
(True/False)
4.8/5
(34)
When Microsoft Access 2013 secures a database with just a password,the database file will be a(n):
(Multiple Choice)
4.9/5
(34)
Distinguish between reprocessing and rollforward as database recovery techniques.
(Essay)
4.9/5
(30)
Ensuring that each SQL statement independently processes consistent rows is known as:
(Multiple Choice)
4.8/5
(39)
What is the least restrictive isolation level that will prevent nonrepeatable reads?
(Multiple Choice)
4.8/5
(29)
The recovery method in which we undo the changes that erroneous or partially processed transactions have made in the database is called ________ recovery.
(Short Answer)
4.7/5
(28)
What database administration functions help bring order to the potential chaos of the database processing environment?
(Essay)
4.7/5
(26)
When Microsoft Access 2013 uses user-level security with an Access 2003 file,the database is stored in a(n):
(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)