Exam 9: Managing Multiuser Databases

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An exclusive lock locks the item from access of any type.

(True/False)
4.9/5
(28)

Explain the concept of an "atomic transaction."

(Essay)
4.7/5
(37)

Two-phased locking is a scheme for achieving serializability of transactions.

(True/False)
4.8/5
(41)

The security provided by the DBMS often has to be augmented by additional security features within the application program.

(True/False)
4.9/5
(34)

All commercial DBMS products use some version of "username and password" as part of their security features.

(True/False)
4.9/5
(32)

Distinguish between the four cursor types.

(Essay)
4.9/5
(36)

Explain the purpose of transaction logs and checkpoints.

(Essay)
4.7/5
(24)

A dynamic cursor saves primary key values when the cursor is opened and retrieves the values for each row as the application program accesses it.

(True/False)
4.8/5
(30)

Database administration is more important but less difficult in multiuser database systems than in single-user database systems.

(True/False)
4.9/5
(42)

Explain the concept of serializable transactions.

(Essay)
4.9/5
(38)

Briefly explain the strategy of two-phased locking.

(Essay)
4.9/5
(37)

Resource locking is one remedy to the lost update problem.

(True/False)
4.9/5
(33)

The DBA has to find a balance between the conflicting goals of maximizing availability of the database to users and protecting the database.

(True/False)
4.9/5
(27)

Reprocessing is normally the most convenient method for recovery after a system failure.

(True/False)
4.8/5
(40)

Resource locking must be carefully planned because most DBMS products cannot detect a deadlock condition.

(True/False)
4.8/5
(33)

Transaction level consistency means that all rows impacted by any actions in a transaction are protected from change during the entire transaction.

(True/False)
4.8/5
(29)

Copies of each database record or page before being changed by a transaction that are saved for use in database recovery are called before images.

(True/False)
4.7/5
(23)

Both rollforward and rollback require the use of a log of transaction results.

(True/False)
5.0/5
(27)

In regard to database security,neither the DBMS nor the database applications can enforce processing responsibilities.

(True/False)
4.9/5
(35)

The size of a lock is referred to as the lock granularity.

(True/False)
4.7/5
(35)
Showing 41 - 60 of 102
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)