Exam 11: Data and Database Administration
Exam 1: The Database Environment and Development Process173 Questions
Exam 2: Modeling Data in the Organization121 Questions
Exam 3: The Enhanced E-R Model and Business Rules74 Questions
Exam 4: Logical Database Design and the Relational Model120 Questions
Exam 5: Physical Database Design and Performance105 Questions
Exam 6: Introduction to SQL119 Questions
Exam 7: Advanced SQL111 Questions
Exam 8: Database Application Development100 Questions
Exam 9: Data Warehousing117 Questions
Exam 10: Data Quality and Integration102 Questions
Exam 11: Data and Database Administration116 Questions
Exam 12: Distributed Databases109 Questions
Exam 13: Object-Oriented Data Modeling91 Questions
Exam 14: Using Relational Databases to Provide Object Persistence113 Questions
Select questions type
A(n)________ is an impasse that results when two or more transactions have locked a common resource,and each waits for the other to unlock that resource.
(Short Answer)
4.7/5
(32)
The extent of the database resource that is included with each lock is called the level of:
(Multiple Choice)
4.9/5
(43)
Controls designed to restrict access and activities are called:
(Multiple Choice)
4.8/5
(27)
A ________ is a query submitted by a DBA to test the current performance of a database or to predict the response time for queries.
(Short Answer)
4.9/5
(35)
A data warehouse administrator has which of the following responsibilities?
(Multiple Choice)
4.9/5
(28)
The logical beginning and end of a transaction is called a ________.
(Short Answer)
4.7/5
(34)
Correct installation of the DBMS product is essential to any environment.
(True/False)
4.9/5
(33)
A(n)________ stores metadata about an organization's data and data processing resources.
(Multiple Choice)
4.8/5
(30)
Allocating 10 percent over suggested installation space is sufficient for a DBMS.
(True/False)
4.9/5
(31)
A(n)________ prevents another transaction from reading and therefore updating a record until it is unlocked.
(Multiple Choice)
4.7/5
(46)
Three-factor authentication is most often implemented with a credit card.
(True/False)
4.8/5
(35)
Specifying database access policies is done during the ________ phase.
(Short Answer)
4.9/5
(40)
The role of a ________ emphasizes integration and coordination of metadata across many data sources.
(Short Answer)
4.9/5
(30)
Optimistic concurrency control,or ________,restricts each transaction to a view of the database as of the time that the transaction was started.
(Short Answer)
4.9/5
(38)
A business transaction is a sequence of steps that constitute some well-defined business activity.
(True/False)
5.0/5
(38)
The Information Resource Lexicon System (IRLS)is a computer software tool used to manage and control access to the information repository.
(True/False)
4.8/5
(35)
Showing 81 - 100 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)