Exam 7: Dbms Functions
Exam 1: Introduction to Database Management50 Questions
Exam 2: The Relational Model 1: Introduction, QBE, and Relational Algebra50 Questions
Exam 3: The Relational Model 2: SQL74 Questions
Exam 4: The Relational Model 3: Advanced Topics50 Questions
Exam 5: Database Design 1: Normalization50 Questions
Exam 6: Database Design 2: Design Method75 Questions
Exam 7: Dbms Functions50 Questions
Exam 8: Database Administration50 Questions
Exam 9: Database Management Approaches75 Questions
Select questions type
One strategy to manage deadlocks is to let them occur and then have the DBMS detect and break any deadlock.
(True/False)
4.9/5
(35)
Smart cards have built-in circuits containing processing logic to identify the cardholder.
(True/False)
4.8/5
(39)
The successful completion of a transaction is known as an after log image.
(True/False)
4.9/5
(34)
The technique for identifying the person who is attempting to access the DBMS is known as ____.
(Multiple Choice)
4.9/5
(34)
If two or more users are waiting for the other user to release a lock before they can proceed,this is known as a ____.
(Multiple Choice)
4.9/5
(39)
One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table,the whole table must be locked.
(True/False)
4.7/5
(38)
A DBMS must provide ways to ensure that only authorized users can access the database.
(True/False)
4.9/5
(42)
The more important it is to avoid redoing work,the more often you should make backups.
(True/False)
4.9/5
(29)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)