Exam 7: Dbms Functions
Exam 1: Introduction to Database Management50 Questions
Exam 2: The Relational Model 1: Introduction, QBE, and Relational Algebra50 Questions
Exam 3: The Relational Model 2: SQL75 Questions
Exam 4: The Relational Model 3: Advanced Topics50 Questions
Exam 5: Database Design 1: Normalization50 Questions
Exam 6: Database Design 2: Design Method75 Questions
Exam 7: Dbms Functions50 Questions
Exam 8: Database Administration50 Questions
Exam 9: Database Management Approaches75 Questions
Select questions type
In which procedure does the DBMS read the log for the problem transactions and apply the before images to undo their updates?
(Multiple Choice)
4.8/5
(36)
In updating and retrieving data, users need to know how data is physically structured on a storage medium.
(True/False)
4.8/5
(33)
If the database has been destroyed, you can use a rollback to recover the database to a valid state by undoing problem transactions.
(True/False)
4.8/5
(40)
What type of rules specify which users have what type of access to which data in the database?
(Multiple Choice)
4.8/5
(22)
You can improve the performance of the recovery program by having it first scan the log and then apply the last after image.
(True/False)
4.9/5
(33)
A user's ____________________ specify what kind of access the user has to objects in the database.
(Short Answer)
4.8/5
(40)
Which authentication method identifies users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics?
(Multiple Choice)
4.9/5
(32)
One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table, the whole table must be locked.
(True/False)
4.8/5
(45)
A(n) ____________________ is a set of steps completed by a DBMS to accomplish a single user task.
(Short Answer)
4.7/5
(38)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)