Exam 7: Dbms Functions

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

When the DBMS locks more rows and releases none of the locks,this is called an expanding phase.​

(True/False)
4.9/5
(30)

In some database systems,such as Microsoft Access,users can access and update metadata about fields,tables,relationships,and indexes.​

(True/False)
4.8/5
(43)

​A backward recovery is also called a(n)____________________.

(Short Answer)
4.7/5
(31)

Discuss the four ways in which integrity constraints can be handled.​

(Essay)
4.9/5
(35)

A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a ____.​

(Multiple Choice)
4.8/5
(26)

The DBA usually creates groups of users called ____.​

(Multiple Choice)
4.8/5
(36)

One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table,the whole table must be locked.​

(True/False)
4.8/5
(36)

Smart cards have built-in circuits containing processing logic to identify the cardholder.​

(True/False)
4.9/5
(30)

Discuss the advantages and disadvantages of timestamping.​

(Essay)
4.7/5
(34)

____ refers to the right of individuals to have certain information about them kept confidential.​

(Multiple Choice)
4.8/5
(32)

The more important it is to avoid redoing work,the more often you should make backups.​

(True/False)
4.9/5
(38)

After a DBMS detects a deadlock,the ____ should break the deadlock.​

(Multiple Choice)
4.8/5
(41)

​____________________ is the prevention of unauthorized access,either intentional or accidental.

(Short Answer)
4.8/5
(39)

In a PC-based DBMS,as long as one program has a row or table locked,no other program may access that row or table.​

(True/False)
4.8/5
(39)

____ rules specify which users have what type of access to which data in the database.​

(Multiple Choice)
4.8/5
(37)

A(n)____ is a snapshot of certain data in a database at a given moment in time.​

(Multiple Choice)
4.9/5
(41)

If two or more users are waiting for the other user to release a lock before they can proceed,this is known as a ____.​

(Multiple Choice)
4.8/5
(35)

Encrypted data can be read by a word processor program.​

(True/False)
4.8/5
(41)

The DBMS accomplishes ____ by reading the log for the problem transactions and applying the before images to undo their updates.​

(Multiple Choice)
4.9/5
(35)

____ integrity implies that the value entered for any field should be consistent with the data type for that field.​

(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)