Exam 6: Database Administration
Exam 1: Getting Started82 Questions
Exam 2: The Relational Model90 Questions
Exam 3: Structured Query Language97 Questions
Exam 4: Data Modeling and the Entity Relationship Model83 Questions
Exam 5: Database Design81 Questions
Exam 6: Database Administration78 Questions
Exam 7: Database Processing Applications84 Questions
Exam 8: Data Warehouses,Business Intelligence Systems,and Big Data100 Questions
Exam 9: Learn how to create a database in SQL Server 201643 Questions
Exam 10: Learn how to create a database in Oracle Database XE 11g Release 252 Questions
Exam 11: Learn how to create a database in MySQL 5.7 Community Server Edition72 Questions
Exam 12: Introduce the topic of importing Microsoft Excel 2016 data into a database table84 Questions
Exam 13: To be able to create a statement of work (SOW)54 Questions
Exam 14: Learn how to create E-R data models in Microsoft Visio 201633 Questions
Exam 15: Learn how to create Microsoft Access 2016 switchboards17 Questions
Exam 16: Know how to configure and update PHP36 Questions
Exam 17: Learn the basic concepts of business intelligence (BI)systems98 Questions
Exam 18: Learn about replicated partitioned data stores for supporting clusters75 Questions
Select questions type
Concurrent processing of a database only poses problems when two or more processes attempt to use the same data.
Free
(True/False)
4.9/5
(36)
Correct Answer:
True
Breaking hardware,power outages,and human mistakes are all reasons that ________.
Free
(Short Answer)
4.9/5
(30)
Correct Answer:
computers fail; computer systems fail
Briefly define the three problems that can occur because of concurrent processing that are addressed by resource locking.
Free
(Essay)
4.8/5
(32)
Correct Answer:
The three problems that can occur because of concurrent processing are dirty reads,nonrepeatable reads,and phantom reads.A dirty read occurs when a transaction reads a changed record that has not been committed to the database.If the change is cancelled before it is committed,then the read will contain incorrect data.A nonrepeatable read occurs when a transaction rereads data and finds modifications or deletions caused by another transaction.A phantom read occurs when a transaction rereads data and finds new rows that were inserted by another transaction since the prior read.
Two-phase locking can be used to ensure that transactions are serializable.
(True/False)
4.8/5
(37)
What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a different transaction since the prior read?
(Multiple Choice)
4.7/5
(33)
When Microsoft Access 2016 creates a signed package with a digital signature,the database file will be a(n)________.
(Multiple Choice)
4.9/5
(37)
When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be,the transaction is said to be ________.
(Multiple Choice)
4.8/5
(40)
With optimistic locking,locks are first issued,then the transaction is processed,and then the locks are released.
(True/False)
4.8/5
(35)
When Microsoft Access 2016 uses user-level security with an Access 2003 file,the database is stored in a(n)*.accdb file.
(True/False)
4.8/5
(43)
Computer systems fail for which of the following reasons except?
(Multiple Choice)
4.9/5
(35)
Only large database systems have a need for database administration.
(True/False)
4.9/5
(34)
Standard SQL defines four ________,which specify which of the concurrency control problems are allowed to occur.
(Short Answer)
4.8/5
(36)
Database security is easy to achieve since all security is handled by the DBMS,which is a single point of entry into the database.
(True/False)
4.8/5
(36)
One way to prevent concurrent processing problems is to lock data that are retrieved for update.
(True/False)
4.8/5
(44)
Preventing multiple applications from obtaining copies of the same record when the record is about to be changed is called ________.
(Multiple Choice)
4.8/5
(39)
The purpose of concurrency control is to ensure that one user's work does not inappropriately influence another user's work.
(True/False)
4.9/5
(41)
Microsoft Access 2016 can secure databases by using ________ to encrypt and decrypt the database files.
(Short Answer)
4.7/5
(33)
When Microsoft Access 2016 uses user-level security with an Access 2003 file,the database is stored in a(n)________.
(Multiple Choice)
4.8/5
(37)
The recovery technique in which the database is returned to a known state and then all valid transactions are reapplied to the database is known as ________.
(Multiple Choice)
4.9/5
(29)
Showing 1 - 20 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)