Exam 9: Managing Multiuser Databases

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Once processing rights have been defined,they may be implemented at any of these levels except:

(Multiple Choice)
4.8/5
(33)

Which of the following is not true about locks?

(Multiple Choice)
4.9/5
(35)

Which type of lock prevents all types of access to the locked resource?

(Multiple Choice)
4.9/5
(33)

With pessimistic locking,the assumption is made that a conflict will occur.

(True/False)
4.8/5
(37)

Resources are locked for a shorter amount of time with pessimistic locking because the transaction is pre-processed.

(True/False)
4.8/5
(37)

Requiring all application programs to lock resources in the same order is a technique for preventing what problem?

(Multiple Choice)
4.8/5
(31)

Which of the following is allowed by "Repeatable Read Isolation"?

(Multiple Choice)
4.7/5
(38)

Distinguish between statement-level consistency and transaction-level consistency.

(Essay)
4.8/5
(35)

Concurrency control measures are taken to ensure that one user's work has absolutely no influence on another user's work.

(True/False)
5.0/5
(42)

Repeatable Read isolation is the most restrictive level of isolation.

(True/False)
4.9/5
(25)

A transaction is a series of actions to be taken on the database such that either all of them are performed successfully or none of them is performed at all.

(True/False)
4.9/5
(35)

To support rollforward and rollback recovery,transactions must be written to a script before they are applied to the database.

(True/False)
4.7/5
(27)

An exclusive lock locks the item from access of any type.

(True/False)
4.8/5
(26)

Briefly define the four isolation levels and the problems they prevent.

(Essay)
4.8/5
(41)

One remedy for the inconsistencies caused by concurrent processing is ________.

(Multiple Choice)
4.7/5
(34)

Which of the following is true about making changes to the database structure?

(Multiple Choice)
4.9/5
(35)

The security provided by the DBMS often has to be augmented by additional security features within the application program.

(True/False)
4.8/5
(32)

Which are more commonly used: implicit or explicit locks? Why?

(Essay)
4.8/5
(39)

A dirty read happens when one transaction reads a changed record that has not been committed to the database.

(True/False)
4.9/5
(42)

The transaction boundaries are the essential information that the DBMS needs from the application programs to enforce different locking strategies.

(True/False)
4.8/5
(39)
Showing 41 - 60 of 102
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)