Exam 6: Database Administration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One advantage of optimistic locking is that the lock is obtained only after the transaction is processed.

(True/False)
5.0/5
(37)

Whether a lock applies to data at the record level,page level,table level,or database level is referred to as:

(Multiple Choice)
4.8/5
(32)

Which of the following is not a means of processing databases?

(Multiple Choice)
4.9/5
(32)

When Microsoft Access 2013 uses user-level security with an Access 2003 database file,it stores the database in a(n)________ file.

(Short Answer)
4.9/5
(36)

The purpose of concurrency control is to ensure that one user's work does not inappropriately influence another user's work.

(True/False)
4.7/5
(33)

Microsoft Access 2013 can secure database files by storing them in a(n)________.

(Short Answer)
4.7/5
(35)

A transaction in which all steps must be completed successfully or none of them will be completed is called a durable transaction.

(True/False)
4.8/5
(35)

Which of the following is not true of database recovery through reprocessing?

(Multiple Choice)
4.8/5
(29)

When Microsoft Access 2013 creates a signed package with a digital signature,the database file will be a(n):

(Multiple Choice)
4.9/5
(41)

When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be,the transaction is said to be:

(Multiple Choice)
4.8/5
(39)

All actions in an atomic transaction are completed successfully or none of the actions are completed at all.

(True/False)
4.8/5
(28)

One way to prevent concurrent processing problems is to lock data that are retrieved for update.

(True/False)
4.9/5
(28)

Preventing multiple applications from obtaining copies of the same record when the record is about to be changed is called:

(Multiple Choice)
4.9/5
(40)

Why do computers fail?

(Essay)
5.0/5
(37)

Only large database systems have a need for database administration.

(True/False)
4.9/5
(30)

What are the four transaction isolation levels?

(Essay)
4.8/5
(31)

The recovery method where the database is restored using the saved data,and all transactions since the save are reapplied is called ________ recovery.

(Short Answer)
4.8/5
(33)

Microsoft Access 2013 can secure databases by using ________ to encrypt and decrypt the database files.

(Short Answer)
4.8/5
(36)

Microsoft Access 2013 databases can be secured using trusted locations for database storage.

(True/False)
4.8/5
(35)

The recovery technique in which the database is returned to a known state and then all valid transactions are reapplied to the database is known as:

(Multiple Choice)
4.7/5
(34)
Showing 41 - 60 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)