Filters
Question type

Study Flashcards

With optimistic locking,the assumption is made that no conflict will occur.

Correct Answer

verifed

verified

The DBA has to find a balance between the conflicting goals of maximizing availability of the database to users and protecting the database.

Correct Answer

verifed

verified

According to ANSI SQL,the serializable isolation level will not allow phantom reads,dirty reads,and nonrepeatable reads.

Correct Answer

verifed

verified

When two transactions are being processed against the database at the same time:


A) they are called concurrent transactions.
B) they are usually interleaved.
C) they always result in a lost update problem.
D) one must be rolled back.
E) A and B

Correct Answer

verifed

verified

In regard to database security,neither the DBMS nor the database applications can enforce processing responsibilities.

Correct Answer

verifed

verified

Copies of each database record or page after it was changed by a transaction that are saved for use in database recovery are called ghost images.

Correct Answer

verifed

verified

Locks that are placed assuming that a conflict will not occur are called:


A) dynamic.
B) explicit.
C) implicit.
D) optimistic.
E) pessimistic.

Correct Answer

verifed

verified

A dynamic cursor saves primary key values when the cursor is opened and retrieves the values for each row as the application program accesses it.

Correct Answer

verifed

verified

Explain the purpose of transaction logs and checkpoints.

Correct Answer

verifed

verified

Transaction logs are created to facilita...

View Answer

An exclusive lock locks the item from change but not from read access.

Correct Answer

verifed

verified

A checkpoint is a point of synchronization between the database and the transaction log.

Correct Answer

verifed

verified

Recovering a database via reprocessing involves:


A) restoring the database from the save and reprocessing all the transactions since the save.
B) restoring the database from the save and reapplying all the changes made by transactions since the save.
C) undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure.
D) recreating the database by reentering all of the data from the beginning,and then reprocessing all of the transactions.
E) synchronizing the database and the transaction log by checkpointing.

Correct Answer

verifed

verified

Measures that are taken to prevent one user's work from inappropriately influencing another user's work are called:


A) concurrency control.
B) checkpoint.
C) database recovery.
D) database logging.
E) interleaving.

Correct Answer

verifed

verified

The DBA is responsible for managing changes to the database structure,but is rarely involved in the original design of the structure.

Correct Answer

verifed

verified

The database is most vulnerable to failure after a change to its structure.

Correct Answer

verifed

verified

Database administration tasks have to be performed for single-user,personal databases.

Correct Answer

verifed

verified

Two-phased locking is a scheme for achieving serializability of transactions.

Correct Answer

verifed

verified

Explain the concept of serializable transactions.

Correct Answer

verifed

verified

Concurrent transactions are two or more ...

View Answer

Requiring all application programs to lock resources in the same order is one way of preventing a deadlock condition.

Correct Answer

verifed

verified

Which of the following is not true of DBMS security features?


A) Users may be assigned to one or more roles.
B) A role may be assigned to only one user.
C) Both users and roles can have many permissions.
D) Objects have many permissions.
E) Each permission pertains to one user or role and one object.

Correct Answer

verifed

verified

Showing 21 - 40 of 102

Related Exams

Show Answer