Exam 9: Managing Multiuser Databases
Exam 1: Introduction100 Questions
Exam 2: Introduction to Structured Query Language114 Questions
Exam 3: The Relational Model and Normalization100 Questions
Exam 4: Database Design Using Normalization100 Questions
Exam 5: Data Modeling With the Entity-Relationship Model104 Questions
Exam 6: Transforming Data Models Into Database Designs103 Questions
Exam 7: SQL for Database Construction and Application Processing104 Questions
Exam 8: Database Redesign103 Questions
Exam 9: Managing Multiuser Databases102 Questions
Exam 10: Managing Databases With SQL Server 2014101 Questions
Exam 11: Managing Databases With Oracle Database106 Questions
Exam 12: Managing Databases With Mysql 5.6101 Questions
Exam 13: The Web Server Environment128 Questions
Exam 14: Big Data, Data-Warehouses, and Business Intelligence Systems108 Questions
Exam 15: Getting Started With Microsoft Access 201353 Questions
Exam 16: Getting Started With Systems Analysis and Design37 Questions
Exam 17: E-R Diagrams and the IDEF1X Standard37 Questions
Exam 18: E-R Diagrams and the UML Standard36 Questions
Exam 19: Getting Started With Mysql Workbench Data Modeling Tools37 Questions
Exam 20: Getting Started With Microsoft Visio 201332 Questions
Exam 21: Data Structures for Database Processing39 Questions
Exam 22: the Semantic Object Model35 Questions
Exam 23: Getting Started With Web Servers, PHP, and the Netbeans IDE35 Questions
Exam 24: Business Intelligence Systems82 Questions
Exam 25: Big Data81 Questions
Select questions type
Both rollforward and rollback require the use of a log of transaction results.
(True/False)
4.8/5
(34)
Distinguish between statement-level consistency and transaction-level consistency.
(Essay)
4.8/5
(33)
The situation that occurs when one user's changes to the database are lost by a second user's changes to the database is known as the ________.
(Multiple Choice)
4.9/5
(42)
A static cursor processes a snapshot of the relation that was taken when the cursor was opened.
(True/False)
4.9/5
(30)
A transaction is sometimes called atomic because it is performed as a unit.
(True/False)
5.0/5
(29)
Which type of lock prevents all types of access to the locked resource?
(Multiple Choice)
4.8/5
(35)
Changes in the database structure usually involve only one application.
(True/False)
5.0/5
(48)
When a transaction reads a row that has been changed,but the change has not been committed,this is known as a ________.
(Multiple Choice)
4.9/5
(34)
Rollforward and reprocessing are two different names for the same technique.
(True/False)
4.9/5
(35)
Once processing rights have been defined,they may be implemented at any of these levels except ________.
(Multiple Choice)
4.8/5
(35)
A transaction is a series of actions to be taken on the database such that either all of them are performed successfully or none of them is performed at all.
(True/False)
4.7/5
(31)
The transaction boundaries are the essential information that the DBMS needs from the application programs to enforce different locking strategies.
(True/False)
5.0/5
(29)
Repeatable Read isolation is the most restrictive level of isolation.
(True/False)
4.8/5
(39)
Processing responsibilities should be documented and encoded into manual procedures.
(True/False)
4.9/5
(40)
Transaction level consistency means that all rows impacted by any actions in a transaction are protected from change during the entire transaction.
(True/False)
4.9/5
(40)
The situation that occurs when two users are each waiting for a resource that the other person has locked is known as a(n)________.
(Multiple Choice)
4.9/5
(37)
The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times.
(True/False)
4.9/5
(32)
Showing 41 - 60 of 102
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)