Filters
Question type

Study Flashcards

The recovery technique in which the database is returned to a known state and then all valid transactions are reapplied to the database is known as:


A) reprocessing.
B) rollback.
C) transaction logging.
D) rollforward.
E) checkpointing.

Correct Answer

verifed

verified

Transactions should be written to the log before they are applied to the database itself.

Correct Answer

verifed

verified

The term DBA refers to the:


A) database accessor.
B) database auditor.
C) data business auditor.
D) database administrator.
E) data business administrator.

Correct Answer

verifed

verified

Concurrent processing of a database only poses problems when two or more processes attempt to use the same data.

Correct Answer

verifed

verified

Breaking hardware,power outages,and human mistakes are all reasons that ________.

Correct Answer

verifed

verified

Microsoft Access 2013 uses a user-level security system.

Correct Answer

verifed

verified

Which of the following is not true of database recovery through reprocessing?


A) Reprocessing makes use of a database save.
B) Reprocessing takes the same amount of time as did processing in the first place.
C) Reprocessing will always return the database to its exact previous state.
D) Reprocessing requires a record of all transactions since the last time the database was saved.
E) All of the above are true of reprocessing.

Correct Answer

verifed

verified

Transaction results are kept in a(n)________,which contains records of the data changes in chronological order.

Correct Answer

verifed

verified

What is the least restrictive isolation level that will prevent dirty reads?


A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read

Correct Answer

verifed

verified

Distinguish between reprocessing and rollforward as database recovery techniques.

Correct Answer

verifed

verified

Reprocessing and rollforward both requir...

View Answer

What are the four transaction isolation levels?

Correct Answer

verifed

verified

The four levels of isolation are Read Un...

View Answer

What database administration functions help bring order to the potential chaos of the database processing environment?

Correct Answer

verifed

verified

First,the actions of concurrent users mu...

View Answer

A point of synchronization between the database and the transaction log is called a(n) :


A) before-image.
B) after-image.
C) recovery.
D) checkpoint.
E) None of the above

Correct Answer

verifed

verified

Distinguish between statement-level consistency and transaction-level consistency.

Correct Answer

verifed

verified

Statement-level consistency requires tha...

View Answer

Statement level consistency means that all statements within a transaction will access consistent rows across the lifetime of the entire transaction.

Correct Answer

verifed

verified

When Microsoft Access 2013 secures a database with just a password,the database file will be a(n) :


A) *.accdb file.
B) *.accdc file.
C) *.accde file.
D) *.mdb file.
E) *.mdw file.

Correct Answer

verifed

verified

Which type of lock assumes that no conflicts will occur?


A) Optimistic locks
B) Granular locks
C) Explicit locks
D) Shared locks
E) Open locks

Correct Answer

verifed

verified

Explain the concept of an "atomic transaction."

Correct Answer

verifed

verified

An atomic transaction is a transaction i...

View Answer

Only large database systems have a need for database administration.

Correct Answer

verifed

verified

A dirty read is a problem with concurrent processing when a transaction rereads data it has already read and finds modifications or deletions caused by another transaction.

Correct Answer

verifed

verified

Showing 41 - 60 of 76

Related Exams

Show Answer