Exam 7: Dbms Functions
Exam 1: Introduction to Database Management50 Questions
Exam 2: The Relational Model 1: Introduction, QBE, and Relational Algebra50 Questions
Exam 3: The Relational Model 2: SQL74 Questions
Exam 4: The Relational Model 3: Advanced Topics50 Questions
Exam 5: Database Design 1: Normalization50 Questions
Exam 6: Database Design 2: Design Method75 Questions
Exam 7: Dbms Functions50 Questions
Exam 8: Database Administration50 Questions
Exam 9: Database Management Approaches75 Questions
Select questions type
____________________ integrity constraints consist of primary key constraints and foreign key constraints.
(Short Answer)
4.8/5
(42)
The most common security features used by DBMSs are locking,journaling,and timestamping.
(True/False)
4.9/5
(35)
After a DBMS detects a deadlock,the ____ should break the deadlock.
(Multiple Choice)
4.8/5
(33)
____ refers to the right of individuals to have certain information about them kept confidential.
(Multiple Choice)
4.9/5
(35)
____ rules specify which users have what type of access to which data in the database.
(Multiple Choice)
4.8/5
(50)
____ integrity implies that the value entered for any field should be consistent with the data type for that field.
(Multiple Choice)
4.8/5
(37)
____ integrity constraints help to ensure the accuracy and consistency of individual field values.
(Multiple Choice)
4.7/5
(40)
____ is the process of returning the database to a state that is known to be correct from a state known to be incorrect.
(Multiple Choice)
4.8/5
(36)
Additional disk and memory space are not required to store timestamp values.
(True/False)
4.9/5
(30)
In some database systems,such as Microsoft Access,users can access and update metadata about fields,tables,relationships,and indexes.
(True/False)
4.8/5
(34)
A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a database ____.
(Multiple Choice)
4.8/5
(35)
____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.
(Short Answer)
4.7/5
(28)
Concentric update occurs when multiple users make updates to the same database at the same time.
(True/False)
4.9/5
(27)
In order to accomplish serial processing of updates,many DBMSs use ____.
(Multiple Choice)
4.8/5
(41)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)