Exam 7: Dbms Functions

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ integrity constraints consist of primary key constraints and foreign key constraints.

(Short Answer)
4.8/5
(42)

The most common security features used by DBMSs are locking,journaling,and timestamping.

(True/False)
4.9/5
(35)

After a DBMS detects a deadlock,the ____ should break the deadlock.

(Multiple Choice)
4.8/5
(33)

____ refers to the right of individuals to have certain information about them kept confidential.

(Multiple Choice)
4.9/5
(35)

A backward recovery is also called a(n) ____________________.

(Short Answer)
4.9/5
(36)

____ rules specify which users have what type of access to which data in the database.

(Multiple Choice)
4.8/5
(50)

Data about the data in a database is known as ____.

(Multiple Choice)
4.8/5
(33)

Legal values is a type of key integrity constraint.

(True/False)
4.9/5
(26)

____ integrity implies that the value entered for any field should be consistent with the data type for that field.

(Multiple Choice)
4.8/5
(37)

____ integrity constraints help to ensure the accuracy and consistency of individual field values.

(Multiple Choice)
4.7/5
(40)

____ is the process of returning the database to a state that is known to be correct from a state known to be incorrect.

(Multiple Choice)
4.8/5
(36)

Additional disk and memory space are not required to store timestamp values.

(True/False)
4.9/5
(30)

Discuss the four ways in which integrity constraints can be handled.

(Essay)
4.7/5
(30)

Each user transaction requires only one lock.

(True/False)
4.9/5
(29)

PC-based DBMSs offer both a data dictionary and a catalog.

(True/False)
4.8/5
(43)

In some database systems,such as Microsoft Access,users can access and update metadata about fields,tables,relationships,and indexes.

(True/False)
4.8/5
(34)

A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a database ____.

(Multiple Choice)
4.8/5
(35)

____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.

(Short Answer)
4.7/5
(28)

Concentric update occurs when multiple users make updates to the same database at the same time.

(True/False)
4.9/5
(27)

In order to accomplish serial processing of updates,many DBMSs use ____.

(Multiple Choice)
4.8/5
(41)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)