Exam 9: Managing Multiuser Databases

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is allowed by "Repeatable Read Isolation"?

(Multiple Choice)
4.9/5
(35)

Locks placed automatically by the DBMS are called implicit locks.

(True/False)
4.7/5
(24)

With pessimistic locking,the assumption is made that a conflict will occur.

(True/False)
4.8/5
(35)

A database save is used to mark the end of a transaction.

(True/False)
4.9/5
(33)

The DBA has to find a balance between the conflicting goals of maximizing availability of the database to users and protecting the database.

(True/False)
5.0/5
(37)

The DBA should periodically analyze run-time statistics of database performance to help manage the DBMS.

(True/False)
4.8/5
(29)

In general,the overall responsibility of the DBA is to facilitate the development and use of the database system.

(True/False)
4.8/5
(40)

Briefly define the four isolation levels and the problems they prevent.

(Essay)
4.8/5
(36)

Nonrepeatable reads occur when a transaction rereads data it has previously read and finds modifications or deletions caused by a committed transaction.

(True/False)
4.8/5
(32)

Concurrency control measures are taken to ensure that one user's work has absolutely no influence on another user's work.

(True/False)
4.9/5
(31)

Reprocessing is normally the most convenient method for recovery after a system failure.

(True/False)
4.9/5
(29)

An active data repository is one in which the metadata is automatically created as the system components are created.

(True/False)
4.7/5
(30)

A series of actions to be taken on the database such that either all actions are completed successfully,or none of them can be completed,is known as a ________.

(Multiple Choice)
4.9/5
(31)

Explain the process of using optimistic locking.

(Essay)
4.8/5
(30)

Distinguish between the four cursor types.

(Essay)
4.9/5
(32)

A dynamic cursor saves primary key values when the cursor is opened and retrieves the values for each row as the application program accesses it.

(True/False)
4.8/5
(28)

Copies of each database record or page after it was changed by a transaction that are saved for use in database recovery are called ghost images.

(True/False)
4.8/5
(30)

Which are more commonly used: implicit or explicit locks? Why?

(Essay)
4.8/5
(31)

When a transaction rereads data that has been changed and finds changes due to committed transactions,this is known as a ________.

(Multiple Choice)
4.8/5
(31)

Which of the following would not be contained in a transaction log?

(Multiple Choice)
4.7/5
(33)
Showing 61 - 80 of 102
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)