Exam 9: Managing Multiuser Databases
Exam 1: Introduction100 Questions
Exam 2: Introduction to Structured Query Language SQL100 Questions
Exam 3: The Relational Model and Normalization100 Questions
Exam 4: Database Design Using Normalization100 Questions
Exam 5: Data Modeling With the Entity-Relationship Model100 Questions
Exam 6: Transforming Data Models Into Database Designs103 Questions
Exam 7: SQL for Database Construction and Application Processing105 Questions
Exam 8: Database Redesign101 Questions
Exam 9: Managing Multiuser Databases102 Questions
Exam 10: Managing Databases With SQL Server 2008 R2100 Questions
Exam 11: Managing Databases With Oracle Database 11g100 Questions
Exam 12: Managing Databases With MySQL 55100 Questions
Exam 13: The Web Server Environment110 Questions
Exam 14: Database Processing With XML100 Questions
Exam 15: Database Processing for Business Intelligence Systems101 Questions
Exam 16: Microsoft Access 201048 Questions
Exam 17: Getting Started With Systems Analysis and Design35 Questions
Exam 18: E-R Diagrams and the Idef1x Standard35 Questions
Exam 19: E-R Diagrams and the UML Standard36 Questions
Exam 20: Getting Started With MySQL Workbench Data Modeling Tools37 Questions
Exam 21: Getting Started With Microsoft Visio 201036 Questions
Exam 22: the Semantic Object Model35 Questions
Exam 23: Data Structures for Database Processing35 Questions
Exam 24: Getting Started With Web Servers php and the Eclipse PDT35 Questions
Select questions type
Database administration tasks have to be performed for single-user,personal databases.
(True/False)
4.8/5
(39)
Concurrency control measures are taken to ensure that one user's work has absolutely no influence on another user's work.
(True/False)
4.9/5
(39)
Repeatable Read isolation is the most restrictive level of isolation.
(True/False)
4.9/5
(34)
Requiring all application programs to lock resources in the same order is a technique for preventing what problem?
(Multiple Choice)
4.8/5
(37)
A lock placed automatically by the DBMS is called a(n)________ lock.
(Multiple Choice)
4.8/5
(37)
A checkpoint is a point of synchronization between the database and the transaction log.
(True/False)
4.7/5
(34)
According to ANSI SQL,the serializable isolation level will not allow phantom reads,dirty reads,and nonrepeatable reads.
(True/False)
4.8/5
(38)
Which of the following would not be contained in a transaction log?
(Multiple Choice)
4.9/5
(34)
A transaction is a group of alternative database actions from which the database can choose to perform only one of them.
(True/False)
4.9/5
(31)
Explicit locks are locks that are placed automatically by the DBMS.
(True/False)
4.8/5
(34)
Distinguish between statement-level consistency and transaction-level consistency.
(Essay)
4.9/5
(42)
Resources are locked for a shorter amount of time with pessimistic locking because the transaction is pre-processed.
(True/False)
4.9/5
(44)
To support rollforward and rollback recovery,transactions must be written to a script before they are applied to the database.
(True/False)
4.8/5
(35)
The DBA is responsible for managing changes to the database structure,but is rarely involved in the original design of the structure.
(True/False)
4.9/5
(37)
With optimistic locking,the assumption is made that no conflict will occur.
(True/False)
4.8/5
(31)
A static cursor processes a snapshot of the relation that was taken when the cursor was opened.
(True/False)
4.8/5
(34)
Locks placed automatically by the DBMS are called implicit locks.
(True/False)
4.9/5
(41)
Showing 21 - 40 of 102
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)