Exam 6: Database Administration
Exam 1: Getting Started76 Questions
Exam 2: The Relational Model87 Questions
Exam 3: Structured Query Language96 Questions
Exam 4: Data Modeling and the Entity-Relationship Model76 Questions
Exam 5: Database Design81 Questions
Exam 6: Database Administration76 Questions
Exam 7: Database Processing Applications82 Questions
Exam 8: Big Data, data Warehouses, and Business Intelligence Systems99 Questions
Exam 9: Getting Started With Microsoft Sql Server 201240 Questions
Exam 10: Getting Started With Oracle Database 11g Release 243 Questions
Exam 11: Getting Started With Mysql 56 Community Server71 Questions
Exam 12: James River Jewelry Project Questions70 Questions
Exam 13: Sql Views47 Questions
Exam 14: Getting Started in Systems Analysis and Design34 Questions
Exam 15: Getting Started With Microsoft Visio 201017 Questions
Exam 16: The Access Workbench-section Microsoft Access35 Questions
Exam 17: Getting Started With Web Servers, php, and the Netbeans IDE98 Questions
Exam 18: Business Intelligence Systems77 Questions
Select questions type
When Microsoft Access 2013 uses user-level security with an Access 2003 database file,it stores the database in a(n)________ file.
(Short Answer)
4.9/5
(35)
One way to prevent concurrent processing problems is to lock data that are retrieved for update.
(True/False)
4.8/5
(31)
Database security is easy to achieve since all security is handled by the DBMS,which is a single point of entry into the database.
(True/False)
4.8/5
(42)
When Microsoft Access 2013 uses user-level security with an Access 2003 file,the database is stored in a(n):
(Multiple Choice)
4.8/5
(40)
Briefly define the three problems that can occur because of concurrent processing that are addressed by resource locking.
(Essay)
4.9/5
(35)
With optimistic locking,locks are first issued,then the transaction is processed,and then the locks are released.
(True/False)
4.7/5
(35)
The recovery method where the database is restored using the saved data,and all transactions since the save are reapplied is called ________ recovery.
(Short Answer)
4.7/5
(37)
Microsoft Access 2013 databases cannot be secured by password encryption.
(True/False)
4.8/5
(38)
Microsoft Access 2013 databases can be secured using trusted locations for database storage.
(True/False)
4.8/5
(39)
Microsoft Access 2013 can secure databases by using ________ to encrypt and decrypt the database files.
(Short Answer)
4.8/5
(36)
One of the major tasks of the database administration is called ________ control,which allows multiple users to access the database simultaneously.
(Short Answer)
4.7/5
(27)
Showing 61 - 76 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)