Exam 6: Database Administration
Exam 1: Getting Started76 Questions
Exam 2: The Relational Model87 Questions
Exam 3: Structured Query Language96 Questions
Exam 4: Data Modeling and the Entity Relationship Model76 Questions
Exam 5: Database Design81 Questions
Exam 6: Database Administration76 Questions
Exam 7: Database Processing Applications82 Questions
Exam 8: Big Data Data Warehouses and Business Intelligence Systems99 Questions
Exam 9: Getting Started With Microsoft Sql Server 2014 Express Edition40 Questions
Exam 10: Getting Started With Oracle Database Express Edition 11g Release 243 Questions
Exam 11: Getting Started With Mysql 5.6 Community Server71 Questions
Exam 12: Sql Views SQL/PSM and Importing Data70 Questions
Exam 13: Getting Started in Systems Analysis and Design47 Questions
Exam 14: Getting Started With Microsoft Visio 201334 Questions
Exam 15: the Access Workbench section H Microsoft Access 2013 Switchboards17 Questions
Exam 16: Getting Started With Web Servers, Php, and the Net beans IDE35 Questions
Exam 17: Business Intelligence Systems98 Questions
Exam 18: Big Data77 Questions
Select questions type
What is the least restrictive isolation level that will prevent phantom read problems?
(Multiple Choice)
4.8/5
(34)
Transaction results are kept in a(n)________,which contains records of the data changes in chronological order.
(Short Answer)
4.9/5
(37)
Standard SQL defines four ________,which specify which of the concurrency control problems are allowed to occur.
(Short Answer)
4.8/5
(32)
Concurrent processing of a database only poses problems when two or more processes attempt to use the same data.
(True/False)
4.9/5
(25)
Statement level consistency means that all statements within a transaction will access consistent rows across the lifetime of the entire transaction.
(True/False)
4.8/5
(34)
Database security is easy to achieve since all security is handled by the DBMS,which is a single point of entry into the database.
(True/False)
4.8/5
(36)
When Microsoft Access 2013 uses user-level security with an Access 2003 file,the database is stored in a(n)*.accdb file.
(True/False)
4.9/5
(31)
Two-phase locking can be used to ensure that transactions are serializable.
(True/False)
4.7/5
(36)
One of the major tasks of the database administration is called ________ control,which allows multiple users to access the database simultaneously.
(Short Answer)
5.0/5
(30)
Database administrators must make sure that ________ measures are in place and enforced so that only authorized users can take authorized actions at appropriate times.
(Short Answer)
4.9/5
(41)
Serializable transactions are created by having a(n)________ phase,in which locks are obtained,and a(n)________ phase,in which locks are released.
(Short Answer)
4.8/5
(29)
The simplest and most feasible means of recovering a database is through reprocessing.
(True/False)
4.7/5
(44)
When Microsoft Access 2013 compiles VBA code in a database,the resulting file is stored using a(n)________ file extension.
(Short Answer)
4.9/5
(30)
Showing 61 - 76 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)