Exam 9: Managing Multiuser Databases
Exam 1: Introduction100 Questions
Exam 2: Introduction to Structured Query Language114 Questions
Exam 3: The Relational Model and Normalization100 Questions
Exam 4: Database Design Using Normalization100 Questions
Exam 5: Data Modeling With the Entity-Relationship Model104 Questions
Exam 6: Transforming Data Models Into Database Designs103 Questions
Exam 7: SQL for Database Construction and Application Processing104 Questions
Exam 8: Database Redesign103 Questions
Exam 9: Managing Multiuser Databases102 Questions
Exam 10: Managing Databases With SQL Server 2014101 Questions
Exam 11: Managing Databases With Oracle Database106 Questions
Exam 12: Managing Databases With Mysql 5.6101 Questions
Exam 13: The Web Server Environment128 Questions
Exam 14: Big Data, Data-Warehouses, and Business Intelligence Systems108 Questions
Exam 15: Getting Started With Microsoft Access 201353 Questions
Exam 16: Getting Started With Systems Analysis and Design37 Questions
Exam 17: E-R Diagrams and the IDEF1X Standard37 Questions
Exam 18: E-R Diagrams and the UML Standard36 Questions
Exam 19: Getting Started With Mysql Workbench Data Modeling Tools37 Questions
Exam 20: Getting Started With Microsoft Visio 201332 Questions
Exam 21: Data Structures for Database Processing39 Questions
Exam 22: the Semantic Object Model35 Questions
Exam 23: Getting Started With Web Servers, PHP, and the Netbeans IDE35 Questions
Exam 24: Business Intelligence Systems82 Questions
Exam 25: Big Data81 Questions
Select questions type
A durable transaction is one for which all committed changes are permanent.
(True/False)
5.0/5
(25)
A dirty read happens when one transaction reads a changed record that has not been committed to the database.
(True/False)
4.8/5
(34)
All commercial DBMS products use some version of "username and password" as part of their security features.
(True/False)
4.9/5
(30)
Which of the following is not true about two-phased locking?
(Multiple Choice)
4.9/5
(36)
With optimistic locking,the assumption is made that no conflict will occur.
(True/False)
4.9/5
(30)
In two-phase locking,all locks are obtained during the growing phase.
(True/False)
4.9/5
(32)
Requiring all application programs to lock resources in the same order is a technique for preventing what problem?
(Multiple Choice)
4.8/5
(31)
Which of the following is not true of DBMS security features?
(Multiple Choice)
5.0/5
(35)
Locks that are placed assuming that a conflict will not occur are called ________.
(Multiple Choice)
5.0/5
(45)
The task of diagnosing errors due to changes in the database structure is eased by ________.
(Multiple Choice)
4.9/5
(38)
A standby data repository is one which requires a person to generate the metadata and place it in the repository.
(True/False)
4.7/5
(36)
Locks placed by a command issued to the DBMS from the application program are called explicit locks.
(True/False)
4.8/5
(26)
Requiring all application programs to lock resources in the same order is one way of preventing a deadlock condition.
(True/False)
4.8/5
(37)
Which type of data repository is composed of metadata that is created automatically as the system components are created?
(Multiple Choice)
4.8/5
(33)
A lock placed automatically by the DBMS is called a(n)________ lock.
(Multiple Choice)
4.8/5
(38)
Explicit locks are locks that are placed automatically by the DBMS.
(True/False)
4.8/5
(36)
Showing 21 - 40 of 102
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)