Filters
Question type

Study Flashcards

In regard to database security,neither the DBMS nor the database applications can enforce processing responsibilities.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not true about locks?


A) Locks with large granularity are easier for the DBMS to administer.
B) Locks with small granularity cause more conflicts.
C) Locks may have a database-level granularity.
D) Locks may have a table-level granularity.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following is not a database administration responsibility of a DBA?


A) Managing the database structure
B) Writing the applications
C) Managing the DBMS
D) Maintaining the data repository

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

In two-phase locking,all locks are released during the contracting phase.

A) True
B) False

Correct Answer

verifed

verified

Recovering a database via reprocessing involves ________.


A) restoring the database from the save and reprocessing all the transactions since the save
B) restoring the database from the save and reapplying all the changes made by transactions since the save
C) undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure
D) recreating the database by reentering all of the data from the beginning,and then reprocessing all of the transactions

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A

Recovering a database via rollforward involves ________.


A) restoring the database from the save and reprocessing all the transactions since the save
B) restoring the database from the save and reapplying all the changes made by transactions since the save
C) undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure
D) re-creating the database by re-entering all of the data from the beginning,and then reprocessing all of the transactions

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

According to ANSI SQL,the serializable isolation level will not allow phantom reads,dirty reads,and nonrepeatable reads.

A) True
B) False

Correct Answer

verifed

verified

Resource locking must be carefully planned because most DBMS products cannot detect a deadlock condition.

A) True
B) False

Correct Answer

verifed

verified

Two-phased locking has a growing phase and a shrinking phase.

A) True
B) False

Correct Answer

verifed

verified

Rollforward is a method of database recovery that restores the database save and all valid transactions since the save was reapplied.

A) True
B) False

Correct Answer

verifed

verified

One remedy for the inconsistencies caused by concurrent processing is ________.


A) concurrency
B) checkpointing
C) rollback
D) resource locking

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Which type of lock still allows other transactions to have read-only access to the locked resource?


A) Exclusive lock
B) Shared lock
C) Explicit lock
D) Implicit lock

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

B

The database is most vulnerable to failure after a change to its structure.

A) True
B) False

Correct Answer

verifed

verified

To support rollforward and rollback recovery,transactions must be written to a script before they are applied to the database.

A) True
B) False

Correct Answer

verifed

verified

Measures that are taken to prevent one user's work from inappropriately influencing another user's work are called ________.


A) concurrency control
B) checkpoint
C) database recovery
D) database logging

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

A

The security provided by the DBMS often has to be augmented by additional security features within the application program.

A) True
B) False

Correct Answer

verifed

verified

Which of the following would a DBA typically NOT do in managing the DBMS?


A) Analyze system performance statistics
B) Install new versions of the operating system,as needed
C) Evaluate new DBMS product features
D) Tune DBMS product options to accommodate other software in use

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

In general,optimistic locking is the preferred technique for Internet databases.

A) True
B) False

Correct Answer

verifed

verified

Ensuring that all rows impacted by the actions of a transaction are protected from changes until the entire transaction is completed is called ________.


A) statement level consistency
B) optimistic locking
C) transaction level consistency
D) durable transactions

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Resource locking is one remedy to the lost update problem.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 102

Related Exams

Show Answer