Exam 7: Dbms Functions

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is descriptive information about the data in a database?

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

C

What strategy can programs employ to minimize the occurrence of deadlocks?

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

D

Which of the following is NOT one of the nine functions of a DBMS?

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

C

What can be described as a snapshot of certain data in a database at a given moment in time?

(Multiple Choice)
4.8/5
(40)

The DBMS must successfully complete all transaction steps or none at all for the database to remain in a correct state.

(True/False)
4.9/5
(39)

When the DBMS locks more rows and releases none of the locks, this is called the contracting phase.

(True/False)
4.8/5
(39)

____________________ constraints are rules that the DBMS must be follow in order to update data accurately and consistently.

(Short Answer)
4.8/5
(54)

A backward recovery is also called a(n) ____________________.

(Short Answer)
4.9/5
(40)

What type of database update occurs when multiple users make updates to the same database at the same time?

(Multiple Choice)
4.9/5
(33)

Explain how a DBMS breaks a deadlock.

(Essay)
4.8/5
(30)

What do key integrity constraints consist of?

(Multiple Choice)
4.9/5
(34)

In order to accomplish serial processing of updates, what technique do many DBMSs use?

(Multiple Choice)
4.7/5
(38)

You can minimize the occurrence of deadlocks by making sure all programs lock records in random order whenever possible.

(True/False)
4.8/5
(36)

DBMSs must manage multiple copies of the same data at multiple locations.

(True/False)
4.9/5
(33)

Which of the following contains information about table relationships, views, indexes, users, privileges, and replicated data?

(Multiple Choice)
4.8/5
(29)

Authentication refers to techniques for decrypting data when it accessed by authorized users.

(True/False)
4.7/5
(33)

____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.

(Short Answer)
4.9/5
(32)

A commit is a record of what the data in a row looked like before an update.

(True/False)
4.7/5
(34)

Discuss the advantages and disadvantages of timestamping.

(Essay)
4.9/5
(35)

One of the nine functions of a DBMS is to provide disk management services.

(True/False)
4.9/5
(31)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)