Exam 9: Managing Multiuser Databases
Exam 1: Introduction100 Questions
Exam 2: Introduction to Structured Query Language114 Questions
Exam 3: The Relational Model and Normalization100 Questions
Exam 4: Database Design Using Normalization100 Questions
Exam 5: Data Modeling With the Entity-Relationship Model104 Questions
Exam 6: Transforming Data Models Into Database Designs103 Questions
Exam 7: SQL for Database Construction and Application Processing104 Questions
Exam 8: Database Redesign103 Questions
Exam 9: Managing Multiuser Databases102 Questions
Exam 10: Managing Databases With SQL Server 2014101 Questions
Exam 11: Managing Databases With Oracle Database106 Questions
Exam 12: Managing Databases With Mysql 5.6101 Questions
Exam 13: The Web Server Environment128 Questions
Exam 14: Big Data, Data-Warehouses, and Business Intelligence Systems108 Questions
Exam 15: Getting Started With Microsoft Access 201353 Questions
Exam 16: Getting Started With Systems Analysis and Design37 Questions
Exam 17: E-R Diagrams and the IDEF1X Standard37 Questions
Exam 18: E-R Diagrams and the UML Standard36 Questions
Exam 19: Getting Started With Mysql Workbench Data Modeling Tools37 Questions
Exam 20: Getting Started With Microsoft Visio 201332 Questions
Exam 21: Data Structures for Database Processing39 Questions
Exam 22: the Semantic Object Model35 Questions
Exam 23: Getting Started With Web Servers, PHP, and the Netbeans IDE35 Questions
Exam 24: Business Intelligence Systems82 Questions
Exam 25: Big Data81 Questions
Select questions type
Measures that are taken to prevent one user's work from inappropriately influencing another user's work are called ________.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
A
Recovering a database via reprocessing involves ________.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
A
Which type of lock still allows other transactions to have read-only access to the locked resource?
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
B
One remedy for the inconsistencies caused by concurrent processing is ________.
(Multiple Choice)
4.8/5
(46)
Ensuring that all rows impacted by the actions of a transaction are protected from changes until the entire transaction is completed is called ________.
(Multiple Choice)
4.8/5
(36)
Which of the following would a DBA typically NOT do in managing the DBMS?
(Multiple Choice)
4.8/5
(29)
Resource locking must be carefully planned because most DBMS products cannot detect a deadlock condition.
(True/False)
4.8/5
(30)
The security provided by the DBMS often has to be augmented by additional security features within the application program.
(True/False)
4.9/5
(30)
According to ANSI SQL,the serializable isolation level will not allow phantom reads,dirty reads,and nonrepeatable reads.
(True/False)
4.8/5
(28)
In general,optimistic locking is the preferred technique for Internet databases.
(True/False)
4.8/5
(43)
To support rollforward and rollback recovery,transactions must be written to a script before they are applied to the database.
(True/False)
4.9/5
(39)
Rollforward is a method of database recovery that restores the database save and all valid transactions since the save was reapplied.
(True/False)
4.7/5
(34)
In two-phase locking,all locks are released during the contracting phase.
(True/False)
4.7/5
(34)
Which of the following is not a database administration responsibility of a DBA?
(Multiple Choice)
4.9/5
(36)
In regard to database security,neither the DBMS nor the database applications can enforce processing responsibilities.
(True/False)
4.8/5
(39)
The database is most vulnerable to failure after a change to its structure.
(True/False)
4.8/5
(31)
Showing 1 - 20 of 102
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)