Exam 9: Managing Multiuser Databases
Exam 1: Introduction100 Questions
Exam 2: Introduction to Structured Query Language SQL105 Questions
Exam 3: The Relational Model and Normalization100 Questions
Exam 4: Database Design Using Normalization100 Questions
Exam 5: Data Modeling With the Entity-Relationship Model100 Questions
Exam 6: Transforming Data Models Into Database Designs103 Questions
Exam 7: Sql for Database Construction and Application Processing100 Questions
Exam 8: Database Redesign101 Questions
Exam 9: Managing Multiuser Databases102 Questions
Exam 10: A: Managing Databases With SQL Server 20012100 Questions
Exam 10: B: Managing Databases With Oracle Database 11g Release 2100 Questions
Exam 10: C: Managing Databases With MySQL100 Questions
Exam 11: The Web Server Environment198 Questions
Exam 12: Big Data datawarehouse and Business Intelligence Systems102 Questions
Exam 13: Microsoft Access 201348 Questions
Exam 14: Getting Started With Systems Analysis and Design35 Questions
Exam 15: E-R Diagrams and the Idef1x Standard35 Questions
Exam 16: E-R Diagrams and the UML Standard36 Questions
Exam 17: Getting Started With MySQL Workbench Data Modeling Tools37 Questions
Exam 18: Getting Started With Microsoft Visio 201334 Questions
Exam 19: Data Structures for Database Processing35 Questions
Exam 20: the Semantic Object Model35 Questions
Exam 21: Getting Started With Web Servers php and the Eclipse PDT35 Questions
Exam 22: Business Intelligence Systems80 Questions
Select questions type
All commercial DBMS products use some version of "username and password" as part of their security features.
(True/False)
4.8/5
(33)
Both rollforward and rollback require the use of a log of transaction results.
(True/False)
4.7/5
(39)
Locks that are placed assuming that a conflict will occur are called:
(Multiple Choice)
4.8/5
(30)
The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times.
(True/False)
4.8/5
(32)
Transaction level consistency means that all rows impacted by any actions in a transaction are protected from change during the entire transaction.
(True/False)
4.9/5
(35)
In two-phase locking,all locks are released during the contracting phase.
(True/False)
4.8/5
(28)
Which type of data repository is composed of metadata that is created automatically as the system components are created?
(Multiple Choice)
4.8/5
(30)
Database administration is more important but less difficult in multiuser database systems than in single-user database systems.
(True/False)
4.8/5
(38)
A static cursor processes a snapshot of the relation that was taken when the cursor was opened.
(True/False)
4.8/5
(36)
Copies of each database record or page before being changed by a transaction that are saved for use in database recovery are called before images.
(True/False)
4.8/5
(38)
In general,optimistic locking is the preferred technique for Internet databases.
(True/False)
4.8/5
(34)
Ensuring that all rows impacted by the actions of a transaction are protected from changes until the entire transaction is completed is called:
(Multiple Choice)
4.9/5
(40)
In general,the overall responsibility of the DBA is to facilitate the development and use of the database system.
(True/False)
4.8/5
(34)
A durable transaction is one for which all committed changes are permanent.
(True/False)
4.9/5
(39)
Rollforward and reprocessing are two different names for the same technique.
(True/False)
4.8/5
(31)
Which of the following would a DBA do in managing the DBMS?
(Multiple Choice)
4.8/5
(33)
When a transaction reads a row that has been changed,but the change has not been committed,this is known as a ________.
(Multiple Choice)
4.8/5
(33)
Showing 81 - 100 of 102
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)