Exam 7: Dbms Functions
Exam 1: Introduction to Database Management50 Questions
Exam 2: The Relational Model 1: Introduction, QBE, and Relational Algebra50 Questions
Exam 3: The Relational Model 2: SQL75 Questions
Exam 4: The Relational Model 3: Advanced Topics50 Questions
Exam 5: Database Design 1: Normalization50 Questions
Exam 6: Database Design 2: Design Method75 Questions
Exam 7: Dbms Functions50 Questions
Exam 8: Database Administration50 Questions
Exam 9: Database Management Approaches75 Questions
Select questions type
Which of the following is descriptive information about the data in a database?
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
C
What strategy can programs employ to minimize the occurrence of deadlocks?
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
D
Which of the following is NOT one of the nine functions of a DBMS?
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
C
What can be described as a snapshot of certain data in a database at a given moment in time?
(Multiple Choice)
4.8/5
(40)
The DBMS must successfully complete all transaction steps or none at all for the database to remain in a correct state.
(True/False)
4.9/5
(39)
When the DBMS locks more rows and releases none of the locks, this is called the contracting phase.
(True/False)
4.8/5
(39)
____________________ constraints are rules that the DBMS must be follow in order to update data accurately and consistently.
(Short Answer)
4.8/5
(54)
What type of database update occurs when multiple users make updates to the same database at the same time?
(Multiple Choice)
4.9/5
(33)
In order to accomplish serial processing of updates, what technique do many DBMSs use?
(Multiple Choice)
4.7/5
(38)
You can minimize the occurrence of deadlocks by making sure all programs lock records in random order whenever possible.
(True/False)
4.8/5
(36)
DBMSs must manage multiple copies of the same data at multiple locations.
(True/False)
4.9/5
(33)
Which of the following contains information about table relationships, views, indexes, users, privileges, and replicated data?
(Multiple Choice)
4.8/5
(29)
Authentication refers to techniques for decrypting data when it accessed by authorized users.
(True/False)
4.7/5
(33)
____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.
(Short Answer)
4.9/5
(32)
A commit is a record of what the data in a row looked like before an update.
(True/False)
4.7/5
(34)
One of the nine functions of a DBMS is to provide disk management services.
(True/False)
4.9/5
(31)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)