Exam 6: Database Administration
Exam 1: Getting Started76 Questions
Exam 2: The Relational Model87 Questions
Exam 3: Structured Query Language96 Questions
Exam 4: Data Modeling and the Entity Relationship Model76 Questions
Exam 5: Database Design81 Questions
Exam 6: Database Administration76 Questions
Exam 7: Database Processing Applications82 Questions
Exam 8: Big Data Data Warehouses and Business Intelligence Systems99 Questions
Exam 9: Getting Started With Microsoft Sql Server 2014 Express Edition40 Questions
Exam 10: Getting Started With Oracle Database Express Edition 11g Release 243 Questions
Exam 11: Getting Started With Mysql 5.6 Community Server71 Questions
Exam 12: Sql Views SQL/PSM and Importing Data70 Questions
Exam 13: Getting Started in Systems Analysis and Design47 Questions
Exam 14: Getting Started With Microsoft Visio 201334 Questions
Exam 15: the Access Workbench section H Microsoft Access 2013 Switchboards17 Questions
Exam 16: Getting Started With Web Servers, Php, and the Net beans IDE35 Questions
Exam 17: Business Intelligence Systems98 Questions
Exam 18: Big Data77 Questions
Select questions type
One advantage of optimistic locking is that the lock is obtained only after the transaction is processed.
(True/False)
5.0/5
(37)
Whether a lock applies to data at the record level,page level,table level,or database level is referred to as:
(Multiple Choice)
4.8/5
(32)
Which of the following is not a means of processing databases?
(Multiple Choice)
4.9/5
(32)
When Microsoft Access 2013 uses user-level security with an Access 2003 database file,it stores the database in a(n)________ file.
(Short Answer)
4.9/5
(36)
The purpose of concurrency control is to ensure that one user's work does not inappropriately influence another user's work.
(True/False)
4.7/5
(33)
Microsoft Access 2013 can secure database files by storing them in a(n)________.
(Short Answer)
4.7/5
(35)
A transaction in which all steps must be completed successfully or none of them will be completed is called a durable transaction.
(True/False)
4.8/5
(35)
Which of the following is not true of database recovery through reprocessing?
(Multiple Choice)
4.8/5
(29)
When Microsoft Access 2013 creates a signed package with a digital signature,the database file will be a(n):
(Multiple Choice)
4.9/5
(41)
When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be,the transaction is said to be:
(Multiple Choice)
4.8/5
(39)
All actions in an atomic transaction are completed successfully or none of the actions are completed at all.
(True/False)
4.8/5
(28)
One way to prevent concurrent processing problems is to lock data that are retrieved for update.
(True/False)
4.9/5
(28)
Preventing multiple applications from obtaining copies of the same record when the record is about to be changed is called:
(Multiple Choice)
4.9/5
(40)
Only large database systems have a need for database administration.
(True/False)
4.9/5
(30)
The recovery method where the database is restored using the saved data,and all transactions since the save are reapplied is called ________ recovery.
(Short Answer)
4.8/5
(33)
Microsoft Access 2013 can secure databases by using ________ to encrypt and decrypt the database files.
(Short Answer)
4.8/5
(36)
Microsoft Access 2013 databases can be secured using trusted locations for database storage.
(True/False)
4.8/5
(35)
The recovery technique in which the database is returned to a known state and then all valid transactions are reapplied to the database is known as:
(Multiple Choice)
4.7/5
(34)
Showing 41 - 60 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)