Filters
Question type

Study Flashcards

In two-phase locking,all locks are obtained during the growing phase.

Correct Answer

verifed

verified

A durable transaction is one for which all committed changes are permanent.

Correct Answer

verifed

verified

Locks that are placed assuming that a conflict will occur are called:


A) dynamic locks.
B) explicit locks.
C) implicit locks.
D) optimistic locks.
E) pessimistic locks.

Correct Answer

verifed

verified

An exclusive lock locks the item from change but not from read access.

Correct Answer

verifed

verified

Which of the following is allowed by "Repeatable Read Isolation"?


A) Nonrepeatable reads
B) Dirty reads
C) Phantom reads
D) A and B
E) A,B and C

Correct Answer

verifed

verified

A "database save" is used to mark the end of a transaction.

Correct Answer

verifed

verified

An active data repository is one in which the metadata is automatically created as the system components are created.

Correct Answer

verifed

verified

Which of the following is not true of DBMS security features?


A) Users may be assigned to one or more roles.
B) A role may be assigned to only one user.
C) Both users and roles can have many permissions.
D) Objects have many permissions.
E) Each permission pertains to one user or role and one object.

Correct Answer

verifed

verified

A dirty read happens when one transaction reads a changed record that has not been committed to the database.

Correct Answer

verifed

verified

Processing responsibilities should be documented and encoded into manual procedures.

Correct Answer

verifed

verified

Recovering a database via reprocessing involves:


A) restoring the database from the save and reprocessing all the transactions since the save.
B) restoring the database from the save and reapplying all the changes made by transactions since the save.
C) undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure.
D) recreating the database by reentering all of the data from the beginning,and then reprocessing all of the transactions.
E) synchronizing the database and the transaction log by checkpointing.

Correct Answer

verifed

verified

Explain the process of using optimistic locking.

Correct Answer

verifed

verified

Optimistic locking makes the assumption ...

View Answer

Which of the following cannot be enforced in the DBMS or application programs?


A) processing rights
B) security
C) processing responsibilities
D) cursors
E) transaction isolation

Correct Answer

verifed

verified

The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times.

Correct Answer

verifed

verified

Changes in the database structure usually involve only one application.

Correct Answer

verifed

verified

A transaction is a series of actions to be taken on the database such that either all of them are performed successfully or none of them is performed at all.

Correct Answer

verifed

verified

A passive data repository is preferred over an active repository because it requires less human intervention.

Correct Answer

verifed

verified

What are objects,and how are they related to the object-oriented DBMS (OODBMS)?

Correct Answer

verifed

verified

An object-oriented DBMS is designed to s...

View Answer

The task of diagnosing errors due to changes in the database structure is eased by:


A) formal policies for requesting changes.
B) database structure change documentation.
C) rollback analysis.
D) configuration control.
E) None of the above.

Correct Answer

verifed

verified

In general,the overall responsibility of the DBA is to facilitate the development and use of the database system.

Correct Answer

verifed

verified

Showing 61 - 80 of 102

Related Exams

Show Answer