Exam 9: Managing Multiuser Databases
Exam 1: Introduction100 Questions
Exam 2: Introduction to Structured Query Language SQL105 Questions
Exam 3: The Relational Model and Normalization100 Questions
Exam 4: Database Design Using Normalization100 Questions
Exam 5: Data Modeling With the Entity-Relationship Model100 Questions
Exam 6: Transforming Data Models Into Database Designs103 Questions
Exam 7: Sql for Database Construction and Application Processing100 Questions
Exam 8: Database Redesign101 Questions
Exam 9: Managing Multiuser Databases102 Questions
Exam 10: A: Managing Databases With SQL Server 20012100 Questions
Exam 10: B: Managing Databases With Oracle Database 11g Release 2100 Questions
Exam 10: C: Managing Databases With MySQL100 Questions
Exam 11: The Web Server Environment198 Questions
Exam 12: Big Data datawarehouse and Business Intelligence Systems102 Questions
Exam 13: Microsoft Access 201348 Questions
Exam 14: Getting Started With Systems Analysis and Design35 Questions
Exam 15: E-R Diagrams and the Idef1x Standard35 Questions
Exam 16: E-R Diagrams and the UML Standard36 Questions
Exam 17: Getting Started With MySQL Workbench Data Modeling Tools37 Questions
Exam 18: Getting Started With Microsoft Visio 201334 Questions
Exam 19: Data Structures for Database Processing35 Questions
Exam 20: the Semantic Object Model35 Questions
Exam 21: Getting Started With Web Servers php and the Eclipse PDT35 Questions
Exam 22: Business Intelligence Systems80 Questions
Select questions type
Once processing rights have been defined,they may be implemented at any of these levels except:
(Multiple Choice)
4.8/5
(33)
Which type of lock prevents all types of access to the locked resource?
(Multiple Choice)
4.9/5
(33)
With pessimistic locking,the assumption is made that a conflict will occur.
(True/False)
4.8/5
(37)
Resources are locked for a shorter amount of time with pessimistic locking because the transaction is pre-processed.
(True/False)
4.8/5
(37)
Requiring all application programs to lock resources in the same order is a technique for preventing what problem?
(Multiple Choice)
4.8/5
(31)
Which of the following is allowed by "Repeatable Read Isolation"?
(Multiple Choice)
4.7/5
(38)
Distinguish between statement-level consistency and transaction-level consistency.
(Essay)
4.8/5
(35)
Concurrency control measures are taken to ensure that one user's work has absolutely no influence on another user's work.
(True/False)
5.0/5
(42)
Repeatable Read isolation is the most restrictive level of isolation.
(True/False)
4.9/5
(25)
A transaction is a series of actions to be taken on the database such that either all of them are performed successfully or none of them is performed at all.
(True/False)
4.9/5
(35)
To support rollforward and rollback recovery,transactions must be written to a script before they are applied to the database.
(True/False)
4.7/5
(27)
Briefly define the four isolation levels and the problems they prevent.
(Essay)
4.8/5
(41)
One remedy for the inconsistencies caused by concurrent processing is ________.
(Multiple Choice)
4.7/5
(34)
Which of the following is true about making changes to the database structure?
(Multiple Choice)
4.9/5
(35)
The security provided by the DBMS often has to be augmented by additional security features within the application program.
(True/False)
4.8/5
(32)
A dirty read happens when one transaction reads a changed record that has not been committed to the database.
(True/False)
4.9/5
(42)
The transaction boundaries are the essential information that the DBMS needs from the application programs to enforce different locking strategies.
(True/False)
4.8/5
(39)
Showing 41 - 60 of 102
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)