Exam 6: Database Administration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Microsoft Access 2016 uses a user-level security system.

(True/False)
4.9/5
(37)

A dirty read is a problem with concurrent processing when a transaction rereads data it has already read and finds modifications or deletions caused by another transaction.

(True/False)
4.8/5
(33)

The recovery method where the database is restored using the saved data,and all transactions since the save are reapplied is called ________ recovery.

(Short Answer)
4.9/5
(28)

Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the database in case of failure and to recover it as quickly and accurately as possible when necessary.

(Short Answer)
4.7/5
(43)

What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database?

(Multiple Choice)
4.8/5
(34)

The term DBA refers to the ________.

(Multiple Choice)
4.8/5
(39)

Microsoft Access 2016 databases cannot be secured by password encryption.

(True/False)
4.7/5
(42)

What is the least restrictive isolation level that will prevent nonrepeatable reads?

(Multiple Choice)
4.8/5
(29)

Which is not a typical processing application for a database?

(Multiple Choice)
4.9/5
(34)

Lock granularity refers to whether a lock is placed by the DBMS automatically or is placed by a command from the application program.

(True/False)
4.8/5
(37)

In comparison to reprocessing,rollforward does not involve the application programs.

(True/False)
4.8/5
(41)

A transaction in which all steps must be completed successfully or none of them will be completed is called a durable transaction.

(True/False)
4.7/5
(34)

Ensuring that each SQL statement independently processes consistent rows is known as ________.

(Multiple Choice)
4.8/5
(40)

Microsoft Access 2016 databases can be secured using trusted locations for database storage.

(True/False)
4.9/5
(39)

Rollback requires the use of logs,but rollforward does not.

(True/False)
4.7/5
(34)

A(n)________ cursor takes a snapshot of a relation and processes that snapshot,while changes from others sources are not visible to this type of cursor.

(Short Answer)
4.9/5
(28)

When Microsoft Access 2016 uses user-level security with an Access 2003 database file,it stores the database in a(n)________ file.

(Short Answer)
4.8/5
(37)

When Microsoft Access 2016 compiles VBA code in a database,the database file will be a(n)________.

(Multiple Choice)
4.9/5
(36)

All actions in an atomic transaction are completed successfully or none of the actions are completed at all.

(True/False)
4.9/5
(33)

When Microsoft Access 2013 secures a database just by storing the database in a trusted location,the database file will be a(n)________.

(Multiple Choice)
4.7/5
(29)
Showing 21 - 40 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)