Exam 6: Database Administration
Exam 1: Getting Started76 Questions
Exam 2: The Relational Model87 Questions
Exam 3: Structured Query Language96 Questions
Exam 4: Data Modeling and the Entity-Relationship Model76 Questions
Exam 5: Database Design81 Questions
Exam 6: Database Administration76 Questions
Exam 7: Database Processing Applications82 Questions
Exam 8: Big Data, data Warehouses, and Business Intelligence Systems99 Questions
Exam 9: Getting Started With Microsoft Sql Server 201240 Questions
Exam 10: Getting Started With Oracle Database 11g Release 243 Questions
Exam 11: Getting Started With Mysql 56 Community Server71 Questions
Exam 12: James River Jewelry Project Questions70 Questions
Exam 13: Sql Views47 Questions
Exam 14: Getting Started in Systems Analysis and Design34 Questions
Exam 15: Getting Started With Microsoft Visio 201017 Questions
Exam 16: The Access Workbench-section Microsoft Access35 Questions
Exam 17: Getting Started With Web Servers, php, and the Netbeans IDE98 Questions
Exam 18: Business Intelligence Systems77 Questions
Select questions type
All actions in an atomic transaction are completed successfully or none of the actions are completed at all.
(True/False)
4.7/5
(33)
Ensuring that each SQL statement independently processes consistent rows is known as:
(Multiple Choice)
4.8/5
(37)
________ is an important business function whose purpose is to manage the database to maximize its value to the organization.
(Short Answer)
4.9/5
(33)
Which of the following is not a means of processing databases?
(Multiple Choice)
4.8/5
(33)
When Microsoft Access 2013 secures a database just by storing the database in a trusted location,the database file will be a(n):
(Multiple Choice)
4.8/5
(34)
Microsoft Access 2013 can secure database files by storing them in a(n)________.
(Short Answer)
4.7/5
(29)
Serializable transactions are created by having a(n)________ phase,in which locks are obtained,and a(n)________ phase,in which locks are released.
(Short Answer)
4.9/5
(41)
In comparison to reprocessing,rollforward does not involve the application programs.
(True/False)
4.8/5
(29)
Microsoft Access 2013 can secure databases by deploying databases packaged with a(n)________.
(Short Answer)
4.9/5
(28)
Two-phase locking can be used to ensure that transactions are serializable.
(True/False)
4.9/5
(35)
Whether a lock applies to data at the record level,page level,table level,or database level is referred to as:
(Multiple Choice)
4.8/5
(34)
The purpose of concurrency control is to ensure that one user's work does not inappropriately influence another user's work.
(True/False)
4.8/5
(35)
When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be,the transaction is said to be:
(Multiple Choice)
4.9/5
(34)
Database administrators must make sure that ________ measures are in place and enforced so that only authorized users can take authorized actions at appropriate times.
(Short Answer)
4.9/5
(35)
The recovery method in which we undo the changes that erroneous or partially processed transactions have made in the database is called ________ recovery.
(Short Answer)
4.8/5
(28)
When Microsoft Access 2013 compiles VBA code in a database,the resulting file is stored using a(n)________ file extension.
(Short Answer)
4.7/5
(36)
Standard SQL defines four ________,which specify which of the concurrency control problems are allowed to occur.
(Short Answer)
4.9/5
(45)
Showing 21 - 40 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)