Exam 7: Dbms Functions
Exam 1: Introduction to Database Management50 Questions
Exam 2: The Relational : Introduction, QBE, and Relational Algebra50 Questions
Exam 3: The Relational : SQL75 Questions
Exam 4: The Relational : Advanced Topics50 Questions
Exam 5: Database Design 1: Normalization50 Questions
Exam 6: Database Design 2: Design Method75 Questions
Exam 7: Dbms Functions50 Questions
Exam 8: Database Administration50 Questions
Exam 9: Database Management Approaches75 Questions
Select questions type
When the DBMS locks more rows and releases none of the locks,this is called an expanding phase.
(True/False)
4.9/5
(30)
In some database systems,such as Microsoft Access,users can access and update metadata about fields,tables,relationships,and indexes.
(True/False)
4.8/5
(43)
Discuss the four ways in which integrity constraints can be handled.
(Essay)
4.9/5
(35)
A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a ____.
(Multiple Choice)
4.8/5
(26)
One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table,the whole table must be locked.
(True/False)
4.8/5
(36)
Smart cards have built-in circuits containing processing logic to identify the cardholder.
(True/False)
4.9/5
(30)
____ refers to the right of individuals to have certain information about them kept confidential.
(Multiple Choice)
4.8/5
(32)
The more important it is to avoid redoing work,the more often you should make backups.
(True/False)
4.9/5
(38)
After a DBMS detects a deadlock,the ____ should break the deadlock.
(Multiple Choice)
4.8/5
(41)
____________________ is the prevention of unauthorized access,either intentional or accidental.
(Short Answer)
4.8/5
(39)
In a PC-based DBMS,as long as one program has a row or table locked,no other program may access that row or table.
(True/False)
4.8/5
(39)
____ rules specify which users have what type of access to which data in the database.
(Multiple Choice)
4.8/5
(37)
A(n)____ is a snapshot of certain data in a database at a given moment in time.
(Multiple Choice)
4.9/5
(41)
If two or more users are waiting for the other user to release a lock before they can proceed,this is known as a ____.
(Multiple Choice)
4.8/5
(35)
The DBMS accomplishes ____ by reading the log for the problem transactions and applying the before images to undo their updates.
(Multiple Choice)
4.9/5
(35)
____ integrity implies that the value entered for any field should be consistent with the data type for that field.
(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)