Exam 6: Database Administration
Exam 1: Getting Started76 Questions
Exam 2: The Relational Model87 Questions
Exam 3: Structured Query Language96 Questions
Exam 4: Data Modeling and the Entity-Relationship Model76 Questions
Exam 5: Database Design81 Questions
Exam 6: Database Administration76 Questions
Exam 7: Database Processing Applications82 Questions
Exam 8: Big Data, data Warehouses, and Business Intelligence Systems99 Questions
Exam 9: Getting Started With Microsoft Sql Server 201240 Questions
Exam 10: Getting Started With Oracle Database 11g Release 243 Questions
Exam 11: Getting Started With Mysql 56 Community Server71 Questions
Exam 12: James River Jewelry Project Questions70 Questions
Exam 13: Sql Views47 Questions
Exam 14: Getting Started in Systems Analysis and Design34 Questions
Exam 15: Getting Started With Microsoft Visio 201017 Questions
Exam 16: The Access Workbench-section Microsoft Access35 Questions
Exam 17: Getting Started With Web Servers, php, and the Netbeans IDE98 Questions
Exam 18: Business Intelligence Systems77 Questions
Select questions type
A transaction in which all steps must be completed successfully or none of them will be completed is called a durable transaction.
Free
(True/False)
4.8/5
(38)
Correct Answer:
False
Additional DBA responsibilities include:
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
E
What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database?
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
C
When Microsoft Access 2013 uses user-level security with an Access 2003 file,the database is stored in a(n)*.accdb file.
(True/False)
4.9/5
(38)
What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a different transaction since the prior read?
(Multiple Choice)
4.8/5
(31)
In terms of database security,a user can be assigned many roles,and a role can be assigned to many users.
(True/False)
4.8/5
(33)
When Microsoft Access 2013 creates a signed package with a digital signature,the database file will be a(n):
(Multiple Choice)
4.9/5
(41)
Generally,the more restrictive the transaction isolation level,the less the throughput of database processing.
(True/False)
4.9/5
(32)
What is the least restrictive isolation level that will prevent phantom read problems?
(Multiple Choice)
4.8/5
(28)
Preventing multiple applications from obtaining copies of the same record when the record is about to be changed is called:
(Multiple Choice)
4.8/5
(34)
Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the database in case of failure and to recover it as quickly and accurately as possible when necessary.
(Short Answer)
4.9/5
(40)
The simplest and most feasible means of recovering a database is through reprocessing.
(True/False)
4.7/5
(29)
Lock granularity refers to whether a lock is placed by the DBMS automatically or is placed by a command from the application program.
(True/False)
4.7/5
(43)
When Microsoft Access 2013 compiles VBA code in a database,the database file will be a(n):
(Multiple Choice)
4.9/5
(33)
One advantage of optimistic locking is that the lock is obtained only after the transaction is processed.
(True/False)
4.8/5
(38)
What is the least restrictive isolation level that will prevent nonrepeatable reads?
(Multiple Choice)
4.9/5
(38)
Microsoft Access 2013 databases can be secured by deploying databases packaged with digital signatures.
(True/False)
4.7/5
(43)
Showing 1 - 20 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)