Exam 7: Dbms Functions

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In which procedure does the DBMS read the log for the problem transactions and apply the before images to undo their updates?

(Multiple Choice)
4.8/5
(36)

In updating and retrieving data, users need to know how data is physically structured on a storage medium.

(True/False)
4.8/5
(33)

If the database has been destroyed, you can use a rollback to recover the database to a valid state by undoing problem transactions.

(True/False)
4.8/5
(40)

What type of rules specify which users have what type of access to which data in the database?

(Multiple Choice)
4.8/5
(22)

You can improve the performance of the recovery program by having it first scan the log and then apply the last after image.

(True/False)
4.9/5
(33)

A user's ____________________ specify what kind of access the user has to objects in the database.

(Short Answer)
4.8/5
(40)

Discuss the four ways in which integrity constraints can be handled.

(Essay)
4.7/5
(34)

Which authentication method identifies users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics?

(Multiple Choice)
4.9/5
(32)

One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table, the whole table must be locked.

(True/False)
4.8/5
(45)

A(n) ____________________ is a set of steps completed by a DBMS to accomplish a single user task.

(Short Answer)
4.7/5
(38)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)