Deck 11: Data and Database Administration

Full screen (f)
exit full mode
Question
The W3C standard for Web privacy is called:

A) The Web privacy act.
B) Platform for Privacy Preferences.
C) Freedom of Web Information Act.
D) The Magna Carta.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is a principal type of authorization table?

A) Subject
B) Transaction
C) View
D) Index
Question
An open-source DBMS is:

A) a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
B) a beta release of a commercial RDBMS.
C) an object-oriented database management system.
D) source code for a commercial RDBMS.
Question
An organization should have one data warehouse administrator for every:

A) 100 users.
B) 100 gigabytes of data in the enterprise data warehouse.
C) department.
D) processor.
Question
While views promote security by restricting user access to data,they are not adequate security measures because:

A) an unauthorized person may gain access to a view through experimentation.
B) all users can read any view.
C) a view's data does not change.
D) none of the above.
Question
Guidelines for server security should include all of the following EXCEPT:

A) securing the network between client and server.
B) guidelines for password lengths.
C) password naming conventions.
D) guidelines for frequency of password changes.
Question
Which of the following is a type of network security:

A) authentication of the client workstation.
B) password naming conventions.
C) guidelines for frequency of password changes.
D) all of the above.
Question
Which of the following functions do cost/benefit models?

A) Database planning
B) Database analysis
C) Database design
D) Operations
Question
Which of the following threats involves outside parties using information to embarrass a company?

A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
Question
Which of the following skills are required of a database administrator?

A) Broad technical background
B) Solid understanding of hardware architectures
C) Managerial skills
D) All of the above
Question
Which of the following is true of poor data and/or database administration?

A) Data timing problems
B) Multiple entity definitions
C) Unknown meanings of stored data
D) All of the above
Question
Which of the following characteristics is required of a data administration manager?

A) Good people skills
B) Sufficient technical skills
C) Ability to sell users on ideas
D) All of the above
Question
________ is a technical function responsible for database design,security,and disaster recovery.

A) Data administration
B) Database administration
C) Tech support
D) Operations
Question
Controls designed to restrict access and activities are called:

A) schemas.
B) business rules.
C) encryption controls.
D) authorization rules.
Question
An information repository supplies information to:

A) users.
B) automated CASE tools.
C) database management systems.
D) all of the above.
Question
A data warehouse administrator has which of the following responsibilities?

A) Build and administer an environment supportive of decision-support applications
B) Build a stable architecture for the data warehouse
C) Develop service level agreements with suppliers and consumers of data for the data warehouse
D) All of the above
Question
Security measures for dynamic Web pages are different from static HTML pages because:

A) dynamic Web pages are built "on the fly".
B) static Web pages contain more sensitive data.
C) the connection requires full access to the database for dynamic pages.
D) all of the above.
Question
A trigger can be used as a security measure in which of the following ways?

A) To prohibit inappropriate actions
B) To cause special handling procedures to be executed
C) To cause a row to be written to a log file
D) All of the above
Question
Which of the following functions develop integrity controls?

A) Database planning
B) Database analysis
C) Database implementation
D) Database design
Question
Which of the following functions model business rules?

A) Database planning
B) Database analysis
C) Database design
D) Operations
Question
Which of the following is not a component of a repository system architecture?

A) An informational model
B) The repository engine
C) A data transformation process
D) The repository database
Question
Forward recovery is faster than restore/rerun because:

A) transactions do not have to be repeated.
B) security can be avoided.
C) images are mirrored.
D) systems are more complete.
Question
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store,process and output electronic data in a secure manner is called a(n):

A) smart chip.
B) smart card.
C) e-credit card.
D) secure card.
Question
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.

A) logging
B) concurrency control
C) transaction authorization
D) multiple management
Question
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.

A) backup facility
B) recovery manager
C) restart facility
D) transaction logger
Question
Which of the following functions are supported by a repository engine?

A) Object management
B) Relationship management
C) Version management
D) All of the above
Question
________ is used to undo unwanted database changes.

A) Rollback
B) Rollforward
C) Restart
D) Encryption
Question
Which of the following is NOT an area of concern when trying to maintain a well-tuned database?

A) Memory usage
B) CPU usage
C) Input/output contention
D) User interface design
Question
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:

A) checkpoint facility.
B) backup facility.
C) recovery manager.
D) database change log.
Question
A(n)________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

A) record controller
B) exclusive lock
C) authorization rule
D) two-phase lock
Question
The extent of the database resource that is included with each lock is called the level of:

A) impact.
B) management.
C) lock granularity.
D) none of the above.
Question
A(n)________ stores metadata about an organization's data and data processing resources.

A) DBA
B) information repository
C) organizational system catalog
D) data dictionary
Question
An optimistic approach to concurrency control is called:

A) versioning.
B) denormalization.
C) deadlock resolution.
D) none of the above.
Question
The preferred method of fixing an aborted transaction is:

A) repairing the schema.
B) switching.
C) duplication of data.
D) backing out the transaction.
Question
A device to measure or detect fingerprints or signatures is called a(n)________ device.

A) biometric
B) view
C) ink
D) laser
Question
When incorrect data have been introduced,the database is best recovered by:

A) backward recovery, if the error has been discovered soon enough.
B) human intervention for only a few errors.
C) restarting from the most recent checkpoint and processing subsequent transactions.
D) all of the above.
Question
An audit trail of database changes is kept by a:

A) change control device.
B) subschema.
C) before image.
D) journalizing facility.
Question
A repository of information about a database that documents data elements of a database is called a:

A) schema.
B) subschema.
C) view.
D) data dictionary.
Question
A(n)________ prevents another transaction from reading and therefore updating a record until it is unlocked.

A) record controller
B) exclusive lock
C) authorization rule
D) shared lock
Question
A discrete unit of work that must be processed completely or not at all within a computer system is called a:

A) change control device.
B) transaction.
C) before image.
D) journalizing facility.
Question
A(n)________ is submitted by a DBA to test the current performance of a database or predict the response time for queries.

A) Elusive query
B) Performance test
C) Heartbeat query
D) None of the above
Question
There are two principal types of authorization tables: one for subjects and one for facts.
Question
Specifications for transactions do not need to be reviewed quickly.
Question
A trigger can be used for security purposes to prohibit inappropriate actions,such as changing a salary value outside of a business day.
Question
The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.
Question
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
Question
The transaction log contains before- and after-images of records that have been modified.
Question
With a one-key encryption standard,both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.
Question
A domain is a way to create a structure that acts like a table.
Question
The role of database administration is typically a more hands-on,physical involvement with the management of databases.
Question
Open-source software always comes with complete documentation.
Question
Databases are generally the property of a single department within an organization.
Question
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.
Question
The first line of defense for authentication is the use of passwords,which is a one-factor authentication scheme.
Question
A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities,journalizing facilities,and a recovery manager.
Question
A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes.
Question
A view can be built to present only the data to which a user requires access.
Question
Loss of data integrity does not impact the quality of data in a database.
Question
The data administrator takes responsibility for the overall management of data resources.
Question
Three-factor authentication is most often implemented with a credit card.
Question
Database applications are not very disk intensive.
Question
The repository information model defines types,which should be easy to extend.
Question
The Information Resource Lexicon System (IRLS)is a computer software tool used to manage and control access to the information repository.
Question
A DBMS may perform checkpoints automatically or in response to commands in user application programs.
Question
A typical cause of database destruction is a disk crash.
Question
A business transaction is a sequence of steps that constitute some well-defined business activity.
Question
Correct installation of the DBMS product is essential to any environment.
Question
Backward recovery starts with an earlier copy of the database.
Question
In order to perform a restore/rerun,the database must be mirrored.
Question
Field-level locks are used quite often.
Question
Examination and modification of the SQL code in an application may lead to performance improvements.
Question
Concurrent transactions need to be processed in isolation so that they do not interfere with each other.
Question
Versioning takes the pessimistic approach to locking.
Question
CASE tool-generated information should be fed into repositories.
Question
The granularity of locking is not a critical decision in database design.
Question
Allocating 10 percent over suggested installation space is sufficient for a DBMS.
Question
A repository of information about data is called a catalog.
Question
A deadlock results when two transactions try to read the same record.
Question
Two-phase locking results in a growing phase where locks are acquired and a shrinking phase where locks are released.
Question
A shared lock allows other transactions to read but not update records in use.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/116
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Data and Database Administration
1
The W3C standard for Web privacy is called:

A) The Web privacy act.
B) Platform for Privacy Preferences.
C) Freedom of Web Information Act.
D) The Magna Carta.
B
2
Which of the following is a principal type of authorization table?

A) Subject
B) Transaction
C) View
D) Index
A
3
An open-source DBMS is:

A) a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
B) a beta release of a commercial RDBMS.
C) an object-oriented database management system.
D) source code for a commercial RDBMS.
A
4
An organization should have one data warehouse administrator for every:

A) 100 users.
B) 100 gigabytes of data in the enterprise data warehouse.
C) department.
D) processor.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
5
While views promote security by restricting user access to data,they are not adequate security measures because:

A) an unauthorized person may gain access to a view through experimentation.
B) all users can read any view.
C) a view's data does not change.
D) none of the above.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
6
Guidelines for server security should include all of the following EXCEPT:

A) securing the network between client and server.
B) guidelines for password lengths.
C) password naming conventions.
D) guidelines for frequency of password changes.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is a type of network security:

A) authentication of the client workstation.
B) password naming conventions.
C) guidelines for frequency of password changes.
D) all of the above.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following functions do cost/benefit models?

A) Database planning
B) Database analysis
C) Database design
D) Operations
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following threats involves outside parties using information to embarrass a company?

A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following skills are required of a database administrator?

A) Broad technical background
B) Solid understanding of hardware architectures
C) Managerial skills
D) All of the above
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is true of poor data and/or database administration?

A) Data timing problems
B) Multiple entity definitions
C) Unknown meanings of stored data
D) All of the above
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following characteristics is required of a data administration manager?

A) Good people skills
B) Sufficient technical skills
C) Ability to sell users on ideas
D) All of the above
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
13
________ is a technical function responsible for database design,security,and disaster recovery.

A) Data administration
B) Database administration
C) Tech support
D) Operations
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
14
Controls designed to restrict access and activities are called:

A) schemas.
B) business rules.
C) encryption controls.
D) authorization rules.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
15
An information repository supplies information to:

A) users.
B) automated CASE tools.
C) database management systems.
D) all of the above.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
16
A data warehouse administrator has which of the following responsibilities?

A) Build and administer an environment supportive of decision-support applications
B) Build a stable architecture for the data warehouse
C) Develop service level agreements with suppliers and consumers of data for the data warehouse
D) All of the above
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
17
Security measures for dynamic Web pages are different from static HTML pages because:

A) dynamic Web pages are built "on the fly".
B) static Web pages contain more sensitive data.
C) the connection requires full access to the database for dynamic pages.
D) all of the above.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
18
A trigger can be used as a security measure in which of the following ways?

A) To prohibit inappropriate actions
B) To cause special handling procedures to be executed
C) To cause a row to be written to a log file
D) All of the above
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following functions develop integrity controls?

A) Database planning
B) Database analysis
C) Database implementation
D) Database design
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following functions model business rules?

A) Database planning
B) Database analysis
C) Database design
D) Operations
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is not a component of a repository system architecture?

A) An informational model
B) The repository engine
C) A data transformation process
D) The repository database
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
22
Forward recovery is faster than restore/rerun because:

A) transactions do not have to be repeated.
B) security can be avoided.
C) images are mirrored.
D) systems are more complete.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
23
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store,process and output electronic data in a secure manner is called a(n):

A) smart chip.
B) smart card.
C) e-credit card.
D) secure card.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
24
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.

A) logging
B) concurrency control
C) transaction authorization
D) multiple management
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
25
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.

A) backup facility
B) recovery manager
C) restart facility
D) transaction logger
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following functions are supported by a repository engine?

A) Object management
B) Relationship management
C) Version management
D) All of the above
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
27
________ is used to undo unwanted database changes.

A) Rollback
B) Rollforward
C) Restart
D) Encryption
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is NOT an area of concern when trying to maintain a well-tuned database?

A) Memory usage
B) CPU usage
C) Input/output contention
D) User interface design
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
29
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a:

A) checkpoint facility.
B) backup facility.
C) recovery manager.
D) database change log.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
30
A(n)________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

A) record controller
B) exclusive lock
C) authorization rule
D) two-phase lock
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
31
The extent of the database resource that is included with each lock is called the level of:

A) impact.
B) management.
C) lock granularity.
D) none of the above.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
32
A(n)________ stores metadata about an organization's data and data processing resources.

A) DBA
B) information repository
C) organizational system catalog
D) data dictionary
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
33
An optimistic approach to concurrency control is called:

A) versioning.
B) denormalization.
C) deadlock resolution.
D) none of the above.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
34
The preferred method of fixing an aborted transaction is:

A) repairing the schema.
B) switching.
C) duplication of data.
D) backing out the transaction.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
35
A device to measure or detect fingerprints or signatures is called a(n)________ device.

A) biometric
B) view
C) ink
D) laser
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
36
When incorrect data have been introduced,the database is best recovered by:

A) backward recovery, if the error has been discovered soon enough.
B) human intervention for only a few errors.
C) restarting from the most recent checkpoint and processing subsequent transactions.
D) all of the above.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
37
An audit trail of database changes is kept by a:

A) change control device.
B) subschema.
C) before image.
D) journalizing facility.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
38
A repository of information about a database that documents data elements of a database is called a:

A) schema.
B) subschema.
C) view.
D) data dictionary.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)________ prevents another transaction from reading and therefore updating a record until it is unlocked.

A) record controller
B) exclusive lock
C) authorization rule
D) shared lock
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
40
A discrete unit of work that must be processed completely or not at all within a computer system is called a:

A) change control device.
B) transaction.
C) before image.
D) journalizing facility.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
41
A(n)________ is submitted by a DBA to test the current performance of a database or predict the response time for queries.

A) Elusive query
B) Performance test
C) Heartbeat query
D) None of the above
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
42
There are two principal types of authorization tables: one for subjects and one for facts.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
43
Specifications for transactions do not need to be reviewed quickly.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
44
A trigger can be used for security purposes to prohibit inappropriate actions,such as changing a salary value outside of a business day.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
45
The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
46
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
47
The transaction log contains before- and after-images of records that have been modified.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
48
With a one-key encryption standard,both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
49
A domain is a way to create a structure that acts like a table.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
50
The role of database administration is typically a more hands-on,physical involvement with the management of databases.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
51
Open-source software always comes with complete documentation.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
52
Databases are generally the property of a single department within an organization.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
53
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
54
The first line of defense for authentication is the use of passwords,which is a one-factor authentication scheme.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
55
A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities,journalizing facilities,and a recovery manager.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
56
A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
57
A view can be built to present only the data to which a user requires access.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
58
Loss of data integrity does not impact the quality of data in a database.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
59
The data administrator takes responsibility for the overall management of data resources.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
60
Three-factor authentication is most often implemented with a credit card.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
61
Database applications are not very disk intensive.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
62
The repository information model defines types,which should be easy to extend.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
63
The Information Resource Lexicon System (IRLS)is a computer software tool used to manage and control access to the information repository.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
64
A DBMS may perform checkpoints automatically or in response to commands in user application programs.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
65
A typical cause of database destruction is a disk crash.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
66
A business transaction is a sequence of steps that constitute some well-defined business activity.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
67
Correct installation of the DBMS product is essential to any environment.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
68
Backward recovery starts with an earlier copy of the database.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
69
In order to perform a restore/rerun,the database must be mirrored.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
70
Field-level locks are used quite often.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
71
Examination and modification of the SQL code in an application may lead to performance improvements.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
72
Concurrent transactions need to be processed in isolation so that they do not interfere with each other.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
73
Versioning takes the pessimistic approach to locking.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
74
CASE tool-generated information should be fed into repositories.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
75
The granularity of locking is not a critical decision in database design.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
76
Allocating 10 percent over suggested installation space is sufficient for a DBMS.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
77
A repository of information about data is called a catalog.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
78
A deadlock results when two transactions try to read the same record.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
79
Two-phase locking results in a growing phase where locks are acquired and a shrinking phase where locks are released.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
80
A shared lock allows other transactions to read but not update records in use.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 116 flashcards in this deck.