Filters
Question type

Study Flashcards

The DBA is responsible for managing changes to the database structure,but is rarely involved in the original design of the structure.

Correct Answer

verifed

verified

Recovering a database via rollback involves ________.


A) restoring the database from the save and reprocessing all the transactions since the save
B) restoring the database from the save and reapplying all the changes made by transactions since the save
C) undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure
D) re-creating the database by re-entering all of the data from the beginning and,then reprocessing all of the transactions

Correct Answer

verifed

verified

Which of the following is true about making changes to the database structure?


A) The DBA need not get input from users on the issue because it is a technical decision.
B) Formal policies and procedures for requesting a change are not used because they are too limiting.
C) Documentation of when the change was made,how it was made,and why it was made must be created.
D) Changes do not produce unexpected results because the DBA will have investigated the change thoroughly before implementing it.

Correct Answer

verifed

verified

Database administration is more important but less difficult in multiuser database systems than in single-user database systems.

Correct Answer

verifed

verified

Briefly define the three problems that can occur because of concurrent processing that are addressed by resource locking.

Correct Answer

verifed

verified

The three problems that can occur becaus...

View Answer

When two transactions are being processed against the database at the same time ________.


A) they are called concurrent transactions
B) they are usually interleaved
C) they always result in a lost update problem
D) Both A and B are correct

Correct Answer

verifed

verified

A checkpoint is a point of synchronization between the database and the transaction log.

Correct Answer

verifed

verified

Explain the concept of serializable transactions.

Correct Answer

verifed

verified

Concurrent transactions are two or more ...

View Answer

Discuss the DBMS security model.

Correct Answer

verifed

verified

In the DBMS security model,users are ass...

View Answer

Locks that are placed assuming that a conflict will occur are called ________.


A) explicit locks
B) implicit locks
C) optimistic locks
D) pessimistic locks

Correct Answer

verifed

verified

Copies of each database record or page before being changed by a transaction that are saved for use in database recovery are called before images.

Correct Answer

verifed

verified

Database administration tasks have to be performed for single-user,personal databases.

Correct Answer

verifed

verified

Which of the following is true of forward only cursors?


A) Current values for each row are retrieved when the application accesses a row.
B) All changes of any type from any source are visible.
C) Changes made by the transaction are visible only if they occur on rows ahead of the cursor.
D) It requires the greatest overhead of any cursor type.

Correct Answer

verifed

verified

Two-phased locking is a scheme for achieving serializability of transactions.

Correct Answer

verifed

verified

One important reason for documenting changes to the database structure is for diagnosing errors.

Correct Answer

verifed

verified

Resources are locked for a shorter amount of time with pessimistic locking because the transaction is pre-processed.

Correct Answer

verifed

verified

A passive data repository is preferred over an active repository because it requires less human intervention.

Correct Answer

verifed

verified

Locks with large granularity are easy for the DBMS to administer but frequently cause conflicts.

Correct Answer

verifed

verified

A transaction is a group of alternative database actions,from which the database can choose to perform only one of them.

Correct Answer

verifed

verified

Which of the following cannot be enforced in the DBMS or application programs?


A) Processing rights
B) Security
C) Processing responsibilities
D) Cursors
E) Transaction isolation

Correct Answer

verifed

verified

Showing 81 - 100 of 102

Related Exams

Show Answer