Exam 7: Dbms Functions
Exam 1: Introduction to Database Management50 Questions
Exam 2: The Relational Model 1: Introduction, QBE, and Relational Algebra50 Questions
Exam 3: The Relational Model 2: SQL75 Questions
Exam 4: The Relational Model 3: Advanced Topics50 Questions
Exam 5: Database Design 1: Normalization50 Questions
Exam 6: Database Design 2: Design Method75 Questions
Exam 7: Dbms Functions50 Questions
Exam 8: Database Administration50 Questions
Exam 9: Database Management Approaches75 Questions
Select questions type
Timestamping avoids the need to lock rows in the database and eliminates the processing time needed to apply and release locks and to detect and resolve deadlocks.
(True/False)
4.7/5
(32)
What technique is used to identify the person who is attempting to access the DBMS?
(Multiple Choice)
4.9/5
(41)
____________________ involves maintaining a log of all updates in the database.
(Short Answer)
4.9/5
(35)
____________________ integrity constraints consist of primary key constraints and foreign key constraints.
(Short Answer)
4.9/5
(33)
Which of the following is a federal law that sets a national standard to protect an individual's medical records and other personal health information?
(Multiple Choice)
4.7/5
(38)
Encryption converts the data in a database to a format that is indecipherable to unauthorized users who attempt to bypass the DBMS.
(True/False)
4.7/5
(33)
When a DBMS uses journaling, the update log is part of the same file in which the database is stored.
(True/False)
4.8/5
(33)
In two-phase locking, the second phase is where the DBMS releases all locks and acquires no new locks.
(True/False)
4.8/5
(31)
_________________________ allows users at different sites to use and modify copies of a database and then share their changes with the other users.
(Short Answer)
4.9/5
(31)
Which of the following is an authentication method in which information used to identify a user is stored on a plastic card?
(Multiple Choice)
4.8/5
(31)
____________________ is the prevention of unauthorized access, either intentional or accidental.
(Short Answer)
4.8/5
(42)
Which process returns the database to a state that is known to be correct?
(Multiple Choice)
4.9/5
(27)
In Microsoft Access, what do you need to decrypt an encrypted database?
(Multiple Choice)
4.7/5
(36)
Which type of data integrity constraint states that the value entered for any field should be consistent with the data type for that field?
(Multiple Choice)
4.7/5
(33)
A DBMS provides a number of ____________________ services that assist in the general maintenance of the database.
(Short Answer)
4.9/5
(35)
What occurs when two or more users are waiting for the other user to release a lock before their transaction can proceed?
(Multiple Choice)
4.8/5
(35)
What is data replication? Describe how replication can lead to more efficient database processing.
(Essay)
4.9/5
(43)
Which property of a DBMS lets you change the database structure without requiring you to change the programs that access the database?
(Multiple Choice)
5.0/5
(32)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)