Exam 6: Database Administration
Exam 1: Getting Started82 Questions
Exam 2: The Relational Model90 Questions
Exam 3: Structured Query Language97 Questions
Exam 4: Data Modeling and the Entity Relationship Model83 Questions
Exam 5: Database Design81 Questions
Exam 6: Database Administration78 Questions
Exam 7: Database Processing Applications84 Questions
Exam 8: Data Warehouses,Business Intelligence Systems,and Big Data100 Questions
Exam 9: Learn how to create a database in SQL Server 201643 Questions
Exam 10: Learn how to create a database in Oracle Database XE 11g Release 252 Questions
Exam 11: Learn how to create a database in MySQL 5.7 Community Server Edition72 Questions
Exam 12: Introduce the topic of importing Microsoft Excel 2016 data into a database table84 Questions
Exam 13: To be able to create a statement of work (SOW)54 Questions
Exam 14: Learn how to create E-R data models in Microsoft Visio 201633 Questions
Exam 15: Learn how to create Microsoft Access 2016 switchboards17 Questions
Exam 16: Know how to configure and update PHP36 Questions
Exam 17: Learn the basic concepts of business intelligence (BI)systems98 Questions
Exam 18: Learn about replicated partitioned data stores for supporting clusters75 Questions
Select questions type
A dirty read is a problem with concurrent processing when a transaction rereads data it has already read and finds modifications or deletions caused by another transaction.
(True/False)
4.8/5
(33)
The recovery method where the database is restored using the saved data,and all transactions since the save are reapplied is called ________ recovery.
(Short Answer)
4.9/5
(28)
Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the database in case of failure and to recover it as quickly and accurately as possible when necessary.
(Short Answer)
4.7/5
(43)
What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database?
(Multiple Choice)
4.8/5
(34)
Microsoft Access 2016 databases cannot be secured by password encryption.
(True/False)
4.7/5
(42)
What is the least restrictive isolation level that will prevent nonrepeatable reads?
(Multiple Choice)
4.8/5
(29)
Which is not a typical processing application for a database?
(Multiple Choice)
4.9/5
(34)
Lock granularity refers to whether a lock is placed by the DBMS automatically or is placed by a command from the application program.
(True/False)
4.8/5
(37)
In comparison to reprocessing,rollforward does not involve the application programs.
(True/False)
4.8/5
(41)
A transaction in which all steps must be completed successfully or none of them will be completed is called a durable transaction.
(True/False)
4.7/5
(34)
Ensuring that each SQL statement independently processes consistent rows is known as ________.
(Multiple Choice)
4.8/5
(40)
Microsoft Access 2016 databases can be secured using trusted locations for database storage.
(True/False)
4.9/5
(39)
A(n)________ cursor takes a snapshot of a relation and processes that snapshot,while changes from others sources are not visible to this type of cursor.
(Short Answer)
4.9/5
(28)
When Microsoft Access 2016 uses user-level security with an Access 2003 database file,it stores the database in a(n)________ file.
(Short Answer)
4.8/5
(37)
When Microsoft Access 2016 compiles VBA code in a database,the database file will be a(n)________.
(Multiple Choice)
4.9/5
(36)
All actions in an atomic transaction are completed successfully or none of the actions are completed at all.
(True/False)
4.9/5
(33)
When Microsoft Access 2013 secures a database just by storing the database in a trusted location,the database file will be a(n)________.
(Multiple Choice)
4.7/5
(29)
Showing 21 - 40 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)