Exam 6: Database Administration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A transaction in which all steps must be completed successfully or none of them will be completed is called a durable transaction.

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

False

Additional DBA responsibilities include:

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

E

What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database?

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

C

Discuss Microsoft Access 2013 security administration.

(Essay)
4.8/5
(42)

When Microsoft Access 2013 uses user-level security with an Access 2003 file,the database is stored in a(n)*.accdb file.

(True/False)
4.9/5
(38)

What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a different transaction since the prior read?

(Multiple Choice)
4.8/5
(31)

In terms of database security,a user can be assigned many roles,and a role can be assigned to many users.

(True/False)
4.8/5
(33)

When Microsoft Access 2013 creates a signed package with a digital signature,the database file will be a(n):

(Multiple Choice)
4.9/5
(41)

Generally,the more restrictive the transaction isolation level,the less the throughput of database processing.

(True/False)
4.9/5
(32)

What is the least restrictive isolation level that will prevent phantom read problems?

(Multiple Choice)
4.8/5
(28)

Preventing multiple applications from obtaining copies of the same record when the record is about to be changed is called:

(Multiple Choice)
4.8/5
(34)

Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the database in case of failure and to recover it as quickly and accurately as possible when necessary.

(Short Answer)
4.9/5
(40)

The simplest and most feasible means of recovering a database is through reprocessing.

(True/False)
4.7/5
(29)

Lock granularity refers to whether a lock is placed by the DBMS automatically or is placed by a command from the application program.

(True/False)
4.7/5
(43)

When Microsoft Access 2013 compiles VBA code in a database,the database file will be a(n):

(Multiple Choice)
4.9/5
(33)

One advantage of optimistic locking is that the lock is obtained only after the transaction is processed.

(True/False)
4.8/5
(38)

What is the least restrictive isolation level that will prevent nonrepeatable reads?

(Multiple Choice)
4.9/5
(38)

An ACID transaction is one that is:

(Multiple Choice)
4.9/5
(30)

Explain the process of using optimistic locking.

(Essay)
4.8/5
(46)

Microsoft Access 2013 databases can be secured by deploying databases packaged with digital signatures.

(True/False)
4.7/5
(43)
Showing 1 - 20 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)