Exam 9: Managing Multiuser Databases
Exam 1: Introduction100 Questions
Exam 2: Introduction to Structured Query Language SQL100 Questions
Exam 3: The Relational Model and Normalization100 Questions
Exam 4: Database Design Using Normalization100 Questions
Exam 5: Data Modeling With the Entity-Relationship Model100 Questions
Exam 6: Transforming Data Models Into Database Designs103 Questions
Exam 7: SQL for Database Construction and Application Processing105 Questions
Exam 8: Database Redesign101 Questions
Exam 9: Managing Multiuser Databases102 Questions
Exam 10: Managing Databases With SQL Server 2008 R2100 Questions
Exam 11: Managing Databases With Oracle Database 11g100 Questions
Exam 12: Managing Databases With MySQL 55100 Questions
Exam 13: The Web Server Environment110 Questions
Exam 14: Database Processing With XML100 Questions
Exam 15: Database Processing for Business Intelligence Systems101 Questions
Exam 16: Microsoft Access 201048 Questions
Exam 17: Getting Started With Systems Analysis and Design35 Questions
Exam 18: E-R Diagrams and the Idef1x Standard35 Questions
Exam 19: E-R Diagrams and the UML Standard36 Questions
Exam 20: Getting Started With MySQL Workbench Data Modeling Tools37 Questions
Exam 21: Getting Started With Microsoft Visio 201036 Questions
Exam 22: the Semantic Object Model35 Questions
Exam 23: Data Structures for Database Processing35 Questions
Exam 24: Getting Started With Web Servers php and the Eclipse PDT35 Questions
Select questions type
Two-phased locking is a scheme for achieving serializability of transactions.
(True/False)
4.8/5
(41)
The security provided by the DBMS often has to be augmented by additional security features within the application program.
(True/False)
4.9/5
(34)
All commercial DBMS products use some version of "username and password" as part of their security features.
(True/False)
4.9/5
(32)
A dynamic cursor saves primary key values when the cursor is opened and retrieves the values for each row as the application program accesses it.
(True/False)
4.8/5
(30)
Database administration is more important but less difficult in multiuser database systems than in single-user database systems.
(True/False)
4.9/5
(42)
The DBA has to find a balance between the conflicting goals of maximizing availability of the database to users and protecting the database.
(True/False)
4.9/5
(27)
Reprocessing is normally the most convenient method for recovery after a system failure.
(True/False)
4.8/5
(40)
Resource locking must be carefully planned because most DBMS products cannot detect a deadlock condition.
(True/False)
4.8/5
(33)
Transaction level consistency means that all rows impacted by any actions in a transaction are protected from change during the entire transaction.
(True/False)
4.8/5
(29)
Copies of each database record or page before being changed by a transaction that are saved for use in database recovery are called before images.
(True/False)
4.7/5
(23)
Both rollforward and rollback require the use of a log of transaction results.
(True/False)
5.0/5
(27)
In regard to database security,neither the DBMS nor the database applications can enforce processing responsibilities.
(True/False)
4.9/5
(35)
Showing 41 - 60 of 102
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)