Databases 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What can be said about the Precedence Graph T1 --> T2? Select one: a. Not all T1 Instructions must execute before the first T2 instruction executes. b. All T1 instructions must execute before the first T2 instruction executes. c. Not all T2 Instructions must execute before the first T1 instruction executes. d. All T2 instructions must execute before the first T1 instruction executes. e. It doesn't matter if T1 or T2 instructions execute first.

b. All T1 instructions must execute before the first T2 instruction executes.

What term describes the effect on a long transaction if a sequence of conflicting short transactions causes repeated restarting of the long transaction? Select one: a. Oblivion b. Obliteration c. Starvation d. Failure e. Deadlock

Starvation

What, in a nutshell, does Thomas' write rule do? Select one: a. It helps generate serializable schedules. b. It helps generate conflict free schedules. c. It helps generate schedules that can be aborted without error. d. It helps generate cascadeless schedules. e. It helps generate schedules with no read operations.

It helps generate serializable schedules.

What are the three primary rules for RBAC? Select one: a. Role assignment, role authorization, permission authorization b. Role assignment, role authentication, permission assignment c. Role authorization, database authorization, permission authorization d. Role assignment, role revocation, permission recovery e. Role auditing, data prioritization, permission prioritization

Role assignment, role authorization, permission authorization

What is needed to achieve Serializability? Select one: a. A set of operations that run concurrently b. A concurrency-control scheme c. A database schema using recovery management d. A transaction schedule that avoids blind write operations e. A data lock

b. A concurrency-control scheme

What is a cascadeless schedule? Select one: a. A schedule where the whole set of instructions takes the shape of only one single cascade. b. A schedule where cascading rollbacks cannot occur. c. A schedule where cascades are avoided by allowing rollbacks. d. A schedule where a cascade is rolled forth and then directly rolled back. e. Cascadeless schedules cannot exist, because every schedule has a cascade.

b. A schedule where cascading rollbacks cannot occur.

Your company's data services are at risk because of a major power outage. What would be good to have right now? Select one: a. A Universal Power Saver b. An Uninterrupted Power Supply c. A Ubiquitous Positioning System d. An Unattended Positronic Servant e. An Upward Polarity Safety

b. An Uninterrupted Power Supply

In a three-tier application model, which level is responsible for authentication? Select one: a. Web server b. Application server c. Database server d. All of the above e. None of the above

b. Application server

What needs to happen as first step to connect to a database? Select one: a. Automatization b. Authentication c. Authorization d. Data Dumping e. Enhancement

b. Authentication

If there is an older system that is incompatible with current systems, we are talking about a... Select one: a. Precursor System b. Legacy System c. Oldtimer System d. Heritage System e. Ancestor System

b. Legacy System

In databases, what kind of value can you use as placeholder to represent missing values? Select one: a. All b. Null c. Void d. (you just leave the field blank) e. Default

b. Null

Which is NOT a type of backup storage medium? Select one: a. Hard Disk b. Magnetic Tape c. Liquid Crystal d. Remote Backup Service (Cloud) e. Optical Storage

c. Liquid Crystal

What is the meaning of the acronym ODBC? Select one: a. Open Database Center b. Official Database Community c. Open Database Connectivity d. Object Data Byte Cache e. Online Database Cell

c. Open Database Connectivity

When speaking of Role-based Access Control, which Acronym is typically used? Select one: a. ROBAC b. ROLAC c. RBAC d. ROLBAC

c. RBAC

What should you do to include natural disasters as possible risk to be mitigated by your backup plan? Select one: a. Buy more storage media. b. Get more security people on your team. c. Store data off-site. d. Earmark at least one third of your data as expendable. e. Nothing, because if a natural disaster strikes, there are more important things to worry about.

c. Store data off-site.

What are the two main architectures for DBMS's? Select one: a. The Last-in-first-out (LIFO) architecture and the First-in-first-out (FIFO) architecture The Last-in-first-out (LIFO) architecture and the First-in-first-out (FIFO) architecture b. The Fast Output and the Ultra Fast Output (UFO) architecture c. The two-tier and the three-tier architecture d. The FBI and the CIA security architecture e. The normalized and the hypernormalized architecture

c. The two-tier and the three-tier architecture

In today's database technology, what is the most common way to authenticate a user for access to a database? Select one: a. Token-Ring-Authentication b. Retina Scan c. Two-factor-Authentication d. Fingerprint Authentication e. Infrared face scan

c. Two-factor-Authentication

When is it usually the hardest to recover data? Select one: a. When you accidentally deleted a file b. When you formatted the storage medium c. When the storage medium got destroyed by fire d. When the storage medium got destroyed by water e. When the storage medium malfunctioned due to age

c. When the storage medium got destroyed by fire

Which main objectives are relevant for database security? Select one: a. Atomicity, Consistency, Isolation, Durability b. Content, Satisfaction, Usability c. Economy, Ecology, Empathy d. Privacy, Integrity, Availability e. Security, Security, Security

d. Privacy, Integrity, Availability

What is it you can do with PHP? Select one: a. Client side scripting b. Database scripting c. Hypertext scripting d. Server side scripting e. Javascripting

d. Server side scripting

What is a data query? Select one: a. A piece of code that defines the rules for a DML compiler for further use. b. A piece of code that publishes the data on social media. c. A piece of code that adds data to the database. d. A piece of code that normalizes the data. e. A piece of code that is understood by the DDL interpreter and returns data entries for further use.

e. A piece of code that is understood by the DDL interpreter and returns data entries for further use.

What do you need before doing a backup? Select one: a. Sensitive data to make it worth the effort. b. Enough manpower to get the job done. c. A backup plan. d. A computer with sufficient hardware, as well as enough storage media.A backup plan. e. All of the above.

e. All of the above

What is a typical risk that can be covered by a backup strategy? Select one: a. Accidental loss of user data b. Database corruption c. Hardware failures d. Natural disasters e. All of the above.

e. All of the above.

What is the most important thing necessary for a successful disaster recovery (with respect to databases). Select one: a. Insurance b. Manpower c. Emergency power for Electricity d. Oxygen Supply e. Backup

e. Backup

What do you call a piece of text or other element of a web page that is "marked up" and clickable, directing you to another resource? Select one: a. Infralink b. Ultralink c. Supralink d. Megalink e. Hyperlink

e. Hyperlink

When are two Schedules "conflict equivalent"? Select one: a. If they cause the same type of conflicts. b. If they do not conflict each other. c. If they are in conflict with each other. d. If they can be transformed from one into the other by reversing the order of instructions. e. If they can be transformed from one into the other by a series of swaps and non-conflicting instructions.

e. If they can be transformed from one into the other by a series of swaps and non-conflicting instructions.

What is the meaning of the acronym LBAC? Select one: a. Logic Based Access Control b. Logic Bound Access Control c. List Based Access Control d. List Bound Access Control e. Label Based Access Control

e. Label Based Access Control

What is NOT an example of e-commerce? Select one: a. Online Shopping b. Online Auctions c. Online Bookstores d. Online Dating e. Open Source Projects

e. Open Source Projects

What kind of symbol is used in a diagram for a relationship set. Select one: a. A circle b. A line c. An oval d. A diamond e. A cube

A diamond

What does the acronym DML stand for? Select one: a. Data Manipulation Language b. Data Mining Language c. Data Mining List d. Dynamic Meta Language e. Dynamic Meta Logic

Data Manipulation Language

What does DBMS stand for? Select one: a. Databases by Microsoft b. Database Management-System c. Data Bound Managerial Safety d. Data Big Mining Software e. Database Manual Sequence

Database Management-System

Which is NOT a type of backup? Select one: a. Incremental b. Differential c. Full d. Dry e. Continuous

Dry

True or false? If your hard drive starts failing, it's best to keep it running as long as possible and try everything you know to save the data. Select one: True False

False

A transaction can be... Select one: a. Hurt b. Killed c. Buried d. Robbed e. Blackmailed

Killed

Which of the following is NOT a data model? Select one: a. Rational Model b. Relational Model c. Entity-Relationship Model d. Object-based Model e. Semistructured Model

Rational Model

Relations in Databases are usually visualized as... Select one: a. Boxes b. Tables c. Hexagons d. Circles e. Holograms

Tables

Which of the following is an example for valid XML code? Select one: a. <name> Humphrey Bogart </name> b. <name> Humphrey Bogart <name> c. <name> Humphrey Bogart </eman> d. <name> Humphrey Bogart <eman> e. <?name> Humphrey Bogart <!name>

a. <name> Humphrey Bogart </name>

What is a valid termination state in which a workflow has failed to achieve its objectives? Select one: a. An aborted acceptable termination state. b. An aborted nonacceptable termination state. c. An aborted incessant termination state. d. An aborted excessive termination state. e. A termination state that has neither been completed or aborted.

a. An aborted acceptable termination state.

In databases, what is an example for a descriptive pattern? Select one: a. Association b. Amortization c. Anodization d. Aristocracy e. Asphyxiation

a. Association

What two techniques for scaleup are used? Select one: a. Batch scaleup and transaction scaleup b. Linear scaleup and nonlinear scaleup c. Direct scaleup and indirect scaleup d. Query scaleup and search scaleup e. Compressed scaleup and uncompressed scaleup

a. Batch scaleup and transaction scaleup

In information retrieval, what can be used to locate a document that contains a certain keyword? Select one: a. Inverted index b. Indexed inversion c. Transposed index d. Index permutations e. Inverted data queries

a. Inverted index

What is the purpose of a compensating transaction? Select one: a. It helps to roll back a transaction without the risk of cascading rollbacks. b. It helps to compensate the user for slow database response. c. It helps to achieve a cascading rollback of a transaction. d. It helps to execute a set of subtransactions before they are committed. e. It helps to commit a set of subtransaction before they are executed.

a. It helps to roll back a transaction without the risk of cascading rollbacks.

Whats is the meaning of RAID? Select one: a. Redundant Array of Inexpensive Disks b. Redundant Array of Indexed Data c. Reduced Assembly of Inexperienced Desktops d. Reduced Application of Integrated Databases e. Real Augmented Inceptive Dimension

a. Redundant Array of Inexpensive Disks

What can be done to ensure that nearly full blocks are output (written to stable storage) by a transaction? Select one: a. Using the group commit technique. b. Using the group transaction technique. c. Using the group workflow technique. d. Using the single transaction technique. e. Using the grouped single transaction technique.

a. Using the group commit technique.

What trick can be used to improve database performance? Select one: a. denormalized relation b. derelated normalization c. normalized relation d. relative normalization e. derelanormification

a. denormalized relation

Sometimes, a distributed database has to be constructed by linking together multiple already-existing database systems, each with its own schema and possibly running different database management software. What do you call this? Select one: a. homogeneous distributed database system b. A heterogeneous distributed database system c. A patched-up distributed database system d. A frizzled distributed database system e. A demonstration database system

b. A heterogeneous distributed database system

What happens in a Backup Schedule? Select one: a. A backup is run continuously b. A backup is run in regular intervals c. A backup is run at random intervals d. A backup isn't run, but the documentation on security is updated. e. If there is no problem, nothing has to happen.

b. A backup is run in regular intervals

What can be used to measure the performance of a database? Select one: a. A workbench b. A benchmark c. A jumpstart d. A kickstand e. A catalyst

b. A benchmark

What is PHP? Select one: a. A client side scripting language b. A server side scripting language c. A programming language for classical application development d. A markup language e. A data query language

b. A server side scripting language

What happens to data if the system crashes? Select one: a. All memory is lost. b. All of the data that were currently in the main memory are lost. c. All of the data on the hard drive are lost. d. All of the backups are lost. e. The user data are lost.

b. All of the data that were currently in the main memory are lost.

Why is it important that a transaction schedule should be serializable? Select one: a. All schedules that preserve consistency of the database are serializable. b. All serializable schedules preserve consistency of the database c. All schedules that conserve the preservation of the database are serializable. d. All serializations that conserve the preservation of the serializable database are able to be e. All consistent schedules can serialize preservable databases.

b. All serializable schedules preserve consistency of the database

Besides a plain list of numbers, what other format of Indices exist? Select one: a. Hasbro Indices b. B-Tree Indices c. Z-Tree Indices d. Dominant Indices e. False Binary Indices (FBI)

b. B-Tree Indices

What do you call it if you do a database backup while the database is inactive, i.e. not available to any users? Select one: a. Iced database backup b. Cold database backup c. Dead database backup d. Hibernated database backup e. Frozen database backup

b. Cold database backup

What is DOM? Select one: a. Domain Object Model b. Document Object Model c. Dominant Object Model d. Distributed Object Model e. Direct Object Model

b. Document Object Model

What dependencies can be used as preconditions for executing a task? Select one: a. Executive privileges, external outputs, values of variables. b. Execution states, output values, external variables. c. Output loops, input blocks, descriptive variables. d. Fast memory, sectors, independent variables. e. Cost, efficiency, effectiveness.

b. Execution states, output values, external variables.

What sort of algorithm do you use to build a decision tree classifier? Select one: a. Hungry Algorithm b. Greedy Algorithm c. Gluttonous Algorithm d. Thirsty Algorithm e. Starving Algorithm

b. Greedy Algorithm

When is a transaction schedule legal? Select one: a. If it follows the law as stipulated in United Nations bill on data integrity, section 283.5B. b. If it follows the rules of the locking protocol that is in place. c. If it is serializable and recoverable. d. If it is reversible. e. If it is irreversible.

b. If it follows the rules of the locking protocol that is in place.

What is achieved by restricting values of data and operations on data? Select one: a. Identity Control b. Integrity Control c. Access Control d. Performance Control e. Control Logic

b. Integrity Control

What is a transaction identifier? Select one: a. It is the unique identifier of the transaction that performed the read operation. b. It is the unique identifier of the transaction that performed the write operation. c. It is the unique identifier of the transaction that performed the delete operation. d. It is the unique identifier of the transaction that performed the commit operation. e. It is the unique identifier of the transaction that performed the stop operation.

b. It is the unique identifier of the transaction that performed the write operation.

In data recovery, often, it can be sufficient to restore the file allocation table (FAT) of a hard drive. Where can you find it? Select one: a. It's located in the system cache. b. It's located in the master boot record (MBR). c. It's located in the random access memory (RAM). d. It's located in the BIOS memory. e. It's located in the data backup.

b. It's located in the master boot record (MBR).

What do you call a process that implements lock manager functionality, which includes lock grant, lock release, and deadlock detection? Select one: a. Key management process b. Lock manager process c. Security management process d. Vault manager process e. Safety manager process

b. Lock manager process

How does a database server deal with multiple requests from different clients? Select one: a. Multiplexing b. Multithreading c. Double NOOPs d. Miniaturization e. Hyperthreading

b. Multithreading

What is likely to happen when you back up from multiple sources that may contain duplicate information to one backup file? Select one: a. Nothing b. Redundancies c. Flash Drive Overheating (FDO) d. Blue Screen e. Data Breach

b. Redundancies

What is true for buffer pages in main memory databases? Select one: a. They are replaced all the time. b. They will never be replaced. c. They are replaced sometimes. d. They are replaced most times. e. They are replaced almost all of the times.

b. They will never be replaced.

What is a namespace used for? Select one: a. To specify a common name to be used as element tag in documents. b. To specify a globally unique name to be used as element tag in documents. c. To specify a name to be used as element tag in documents, either in a global or local way. d. To allocate enough space for tag names in XML (a maximum of 255 characters). e. To ensure that there are enough tags that get repeated.

b. To specify a globally unique name to be used as element tag in documents.

Regression... Select one: a. ... deals with the prediction of a data query. ... deals with the prediction of a data query. b. ... deals with the prediction of user interaction. c. ... deals with the prediction of a value. d. ... deals with the prediction of errors. e. ... deals with the prediction of join operators.

c. ... deals with the prediction of a value.

What is a repository (or archive) of information gathered from multiple sources, stored under a unified schema, at a single site? Select one: a. A data spreadsheet b. A dataset c. A data warehouse d. A data funnel e. Something that doesn't have anything to do with data

c. A data warehouse

What is used to automatically control the execution of tasks? Select one: a. A human controller has to do it, because there is no safe way to control it automatically. b. A ferrite based crystalline data sensor array. c. A workflow-management system. d. A phalanx of radio sensors with an as big as possible detector dish. e. A quantum inference transmission orb (QUITO).

c. A workflow-management system.

What two main architectures are used in parallel processing? Select one: a. Salt and sugar parallel machines b. High pressure and Vacuum parallel machines c. Coarse-grain and fine-grain parallel machines d. Tooth and Claw parallel machines e. Nanotube and Macroscopic parallel machines

c. Coarse-grain and fine-grain parallel machines

Which of the following is true? Select one: a. Transaction-server systems allow clients to interact with the servers by making requests to read or update data, in units such as files or pages. b. Data-server systems provide an interface to which clients can send requests to perform an action, in response to which they execute the action and send back results to the client c. Data-server systems allow clients to interact with the servers by making requests to read or update data, in units such as files or pages. d. Both Data-server systems and Transaction-server systems allow clients to interact with the servers by making requests to read or update data, in units such as files or pages. e. Neither Data-server systems nor Transaction-server systems provide an interface to which clients can send requests to perform an action, in response to which they execute the action and send back results to the client.

c. Data-server systems allow clients to interact with the servers by making requests to read or update data, in units such as files or pages.

When dealing with XML, what does DTD stand for? Select one: a. Dynamic Testing Development b. Dynamic Type Detection c. Document Type Definition d. Direct to Disk e. Digital Topographic Data

c. Document Type Definition

What does the acronym XML stand for? Select one: a. Extensive Markup Language b. Expansive Math Language c. Extensible Markup Language d. Expert Metadata Listing e. External Media Library

c. Extensible Markup Language

In information retrieval, what can have an impact on effectiveness? Select one: a. False negatives and true positives b. True negatives and false positives c. False negatives and false positives d. True negatives and true positives e. True negatives, true positives and true error sets.

c. False negatives and false positives

What does a transaction processing monitor do? Select one: a. It is exclusively responsible for backup and recovery. b. It ensures that a database has always enough memory. c. It provides support to distributed transaction processing. d. It deals with transactions that are especially complex. e. It makes sure that each transaction has the same value.

c. It provides support to distributed transaction processing.

Which is NOT a Transaction Processing Architecture? Select one: a. Many-server, single-router model b. Process-per-client model c. Many- process, single client model d. Many-server, many router model e. Single-server model

c. Many- process, single client model

What is necessary to enable functions like "redo" and "undo"? Select one: a. Removal of duplicates. b. The user should always keep a written list of all transactions, so it is possible to recall what has happened. c. Operation logging. d. Data weeding (the process of thinning out the database regularly so it doesn't run out of memory). e. Data oiling (the process of adding certain empty "bubble" data fields so the data stream flows more smoothly)

c. Operation logging.

What do you call systems with deadlines? Select one: a. Always-in-a-hurry systems b. Running-out-of-time systems c. Real-time systems d. Real-life systems e. Reality systems

c. Real-time systems

Which is an architectural model in parallel database architectures? Select one: a. Shared everything b. Shared something c. Shared nothing d. Shared byte e. Shared power plug

c. Shared nothing

What do you need to do the following operation: create database. Select one: a. Object Privileges b. Data Privileges c. System Privileges d. Subject Privileges e. Phantom Privileges

c. System Privileges

Which benchmark for database performance is NOT obsolete? Select one: a. TPC-A b. TPC-B c. TPC-C d. TPC-D e. TPC-R

c. TPC-C

What is the name of a commonly used database model? Select one: a. The Equity Relationship Model b. The Eternity Relationship Model c. The Entity Relationship Model d. The External Relationship Model e. The Essential Relationship Model

c. The Entity Relationship Model

What do you call the presentation layer of the internet that contains (usually visual) applications that help the user interact with databases and other content? Select one: a. The Internet b. The Data Highway c. The World Wide Web (WWW) d. Windows e. Usenet

c. The World Wide Web (WWW)

What is a common way to connect a website to a database? Select one: a. Recursive Pointers can do that. b. Using direct pipeline modeling with DHTML. Using direct pipeline modeling with DHTML. c. Using PHP and MySQL on a "LAMP" server. d. Dynamic Object JSON Operations (DOJO). e. Mix-in Structures in object oriented scripting languages like XOTcl.

c. Using PHP and MySQL on a "LAMP" server.

In order to transform XML data into HTML, a transformation language has been invented. Which of the following is it? Select one: a. CORBA b. JFORMS c. XSLT d. XMLT e. XPAL

c. XSLT

In more recent times, mobile applications demand for certain types of data to be processed. Which ones? Select one: a. Temporal data b. Spatial data c. Multimedia data d. All of the above e. None of the above

d. All of the above

What data types does the time specification of SQL include? Select one: a. Date b. Time c. Timestamp d. All of the above e. None of the above

d. All of the above

What kind of properties can a deadline have? Select one: a. Hard b. Firm c. Soft d. All of the above e. None of the above

d. All of the above

Which of the following is NOT a transaction state? Select one: a. Committed b. Aborted c. Failed d. Attempted e. Active

d. Attempted

The task of correcting and preprocessing data is called... Select one: a. Data polishing b. Data grooming c. Data detailing d. Data cleansing e. Data waxing

d. Data cleansing

What is the name for a constraint that sets the completion time for a task? Select one: a. Softline b. Hardline c. Lifeline d. Deadline e. Borderline

d. Deadline

What is a simple rule to determining what are the "markup" elements of a document? Select one: a. Everything that is intended for printing is called markup b. Everything that is purely decorative is called markup. c. Everything within a comment is the markup. d. Everything that is only intended for machine-reading and not for printing, is markup. e. Everything that needs to be marked for importance with a text-marker after printing, is markup.

d. Everything that is only intended for machine-reading and not for printing, is markup.

What does an XML schema do? Select one: a. It is a concept that is necessary for data abstraction, and to avoid loss of data. b. It is a construct that enables the constant extension of the XML language. c. It ensures that there are no constraints with respect of data values and types in a document. d. It constrains the values and data types of information present in a document. e. It is only necessary for emergencies, for example if data loss has occurred and recovery is needed

d. It constrains the values and data types of information present in a document.

What is the function of access control? Select one: a. It provides 100% database security. b. It ensures an error-free data quality. c. It controls the access of the database to the user. d. It controls access of the user to the database. e. It enables a regular backup of the database.

d. It controls access of the user to the database

Assume you have a workflow consisting of the subtransactions S1 and S2. S1 and S2 do not provide prepared-to-commit states (for a two-phase commit), and further do not have compensating transactions, and it is possible to reach a state where one subtransaction is committed and the other aborted, and there is no way to bring both to the same state. What can be said about such a workflow? Select one: a. It is fine. b. It is safe. c. It is maybe a bit complicated, but otherwise OK. d. It is unsafe. e. It will lead to disaster.

d. It is unsafe.

What does a "process monitor process" do? Select one: a. It monitors itself and takes recovery actions if it fails. b. It monitors other processes, and if any of them fails, it terminates them. c. It c. It monitors other processes and logs them, other actions are not necessary. d. It monitors other processes, and if any of them fails, it takes recovery actions for the process. e. It monitors other processes, and if any recovery fails, it shuts down.

d. It monitors other processes, and if any of them fails, it takes recovery actions for the process.

What is the meaning of JDBC? Select one: a. Jiffy Database Companion b. Just Data Binary Container c. Javascript Database Connector d. Java Database Connectivity e. Java Backend for Data Centers

d. Java Database Connectivity

What is NOT a typical task in a transaction schedule? Select one: a. Read b. Write c. Abort d. Kill e. Commit

d. Kill

Which of the following is a factor that can impact negatively on efficient parallel operations at the cost of speedup and scaleup? Select one: a. Slew b. Fluke c. Slash d. Skew e. Mash

d. Skew

What two important things do association rules have? Select one: a. Logic and Emotion b. Pride and Prejudice c. Compassion and Belief d. Support and Confidence e. Honor and Strength

d. Support and Confidence

What can be used in a SELECT statement to collect data across multiple records and group the results by one or more columns. Select one: a. The COLLECT statement b. The JOIN statement c. The CASE statement d. The GROUP BY statement e. The WHERE statement

d. The GROUP BY statement

What happens if a human interacts with an active transaction? Select one: a. The transaction becomes more humane. b. Only odd-numbered transactions allow human access. c. The transaction becomes a speedy transaction. d. The transaction becomes a long-duration transaction. e. The transaction's result is zero.

d. The transaction becomes a long-duration transaction.

What is important for a workflow state? Select one: a. The state of the workflow does not need any specific factor to be considered. b. The specification of the CORBA model. c. The content of the data that are moved around in the workflow. d. The values of all variables in the workflow specification. e. The fitness or fatigue of the user.

d. The values of all variables in the workflow specification.

What can attributes of the type IDREF do? Select one: a. They can store a list of IDs b. They can store a list of data volume restrictions. c. They can't store anything, they are just attributes, not data. d. They can store a list of references. e. They can coexist both as deleted and saved items.

d. They can store a list of references.

In DB2, what can the user with the SYSCTRL authority do? Select one: a. add data b. delete data c. access data from tables d. create, update, start and stop the database e. create and update nested database tables

d. create, update, start and stop the database

What does the shared memory contain? Select one: a. Buffer pool b. Lock table c. Log buffer d. Cached query plans e. All of the above

e. All of the above

In XML, what is an element? Select one: a. An element can be anything that is part of a set. b. An element is a small piece of XML, bigger pieces are called group. c. An element is a piece of code that is used for data cleansing. d. An element is only the piece of information that is between the start and end tags. e. An element is a pair of matching start and end tags and what is between them.

e. An element is a pair of matching start and end tags and what is between them.

In databases, what does the acronym CLI stand for? Select one: a. Command Line Interface b. Common Language Infrastructure c. Command Line Interpreter d. Calling Line Identifier e. Call Level Interface

e. Call Level Interface

Database applications can be classified in two main types: Transaction Processing and... Select one: a. Information Retrieval b. Big Data Analysis c. Semantic Web d. Cryptocurrency Mining e. Decision Support

e. Decision Support

Which of the following is a commonly used type of interconnection system in parallel systems? Select one: a. Cyberdyne b. Ultrasquare c. Supradome d. Infrasphere e. Hypercube

e. Hypercube

What is a workflow? Select one: a. Processing entities execute one common task in a coordinated way. b. Processing entities execute random tasks in a somewhat coordinated way. c. Processing entities execute every other task in a coordinated way. d. Processing entities execute one task multiple times with or without a coordinated way. e. Processing entities execute multiple tasks in a coordinated way.

e. Processing entities execute multiple tasks in a coordinated way.

What is the meaning of the acronym SOAP? Select one: a. System Object Analysis Pages b. Sales Online Analytics Program c. Security Organization Awareness Protocol d. Software Object Application Profile e. Simple Object Access Protocol

e. Simple Object Access Protocol

What is the use of Cascading Style Sheets (CSS) Select one: a. They avoid a cascading rollback transaction. b. They enable a cascading rollback transaction. c. CSS is usually program in "applets" or "beans" that make different dynamic procedures transmit data between each other. d. They are responsible to enable the main processor in a computer to do hyperthreading. e. They are used in web design, to visually style a web site consistently.

e. They are used in web design, to visually style a web site consistently.

Which of the following is NOT a well-known database system? Select one: a. Microsoft SQL b. MySQL c. Oracle d. PostgreSQL e. Adobe Application Manager

Adobe Application Manager

What is an advantage of concurrency? Select one: a. The CPU generates less heat. b. The security of the database is increased. c. The waiting time is reduced. d. The failure rate of transactions is reduced. e. The throughput is reduced.

The waiting time is reduced

In Databases, collections of operations that form a single logical unit of work are called... Select one: a. Modifications b. Queries c. Transactions d. Transfers e. Bulk operations

Transactions

One grain of dust... Select one: a. ... is enough to corrupt data when it gets between the head and disk of a hard drive. b. ... is enough to corrupt the entire data immediately if it gets into the casing of a hard drive. c. ... is annoying, but not enough to corrupt any data. d. ... is enough to corrupt data, but only the file allocation table. e. ... can corrupt parts of data, but not the most important ones, because those are always backed up.

a. ... is enough to corrupt data when it gets between the head and disk of a hard drive.

What is the ODBC standard? Select one: a. A database connectivity standard b. A data detection standard for bitcoin mining c. A database correction standard d. A database cooperation standard e. A database standard for data collection

a. A database connectivity standard

In Role based access control, what does a role do? Select one: a. A role controls access to the database according to certain user privileges. b. A role is gives certain responsibilities to the user on a voluntary basis. c. A role always gives the user admin rights. d. A role ensures that the user gets a weekly update on the latest database activities. e. A role ensures that the user can find valuable data by using the element of chance. Each time the user logs on the database the role "rolls" a virtual dice and then the user gets access to a random data entry.

a. A role controls access to the database according to certain user privileges.

What subsystems does a DBMS have? Select one: a. A transaction manager, a query processor and a storage manager. b. A query processor and a storage manager c. A transaction manager and a query processor d. A schema operator and a dynamic ODBC interface e. A sequential quantum language (SQL) processor and a storage manager

a. A transaction manager, a query processor and a storage manager.

What properties should database transactions ideally have? Select one: a. Atomicity, Consistency, Isolation, Durability (ACID) b. Automation, Connectivity, Invulnerability, Distribution (ACID) c. Aspectualization, Centricity, Impact, Dependencies (ACID) d. Aggregation, Coordination, Indestructability, Doubling (ACID) e. Attributes, Code, Indices, Data (ACID)

a. Atomicity, Consistency, Isolation, Durability (ACID)

What technique can be used if a web site receives high traffic by being accessed billions of times in one short interval? Select one: a. Caching b. Hacking c. Fracking d. Hyperthreading e. Bittorrents

a. Caching

Often, even today, tape-based backup solutions are used for backup. What is their key advantage? Select one: a. Cost effectiveness b. Speed c. Fail safety d. Usability e. Ergonomics

a. Cost effectiveness

When does a deadlock happen? Select one: a. If every transaction is waiting for another transaction to finish. b. If a schedule of transactions is rolling itself back without result. c. If there is a transaction in a schedule that has a logical error. d. If a transaction has been corrupted by system failure. e. If the database locks down completely and all data is lost.

a. If every transaction is waiting for another transaction to finish.

What can be tuned to increase performance in a database system? Select one: a. Indices b. Indica c. Inference d. Instances e. Instants

a. Indices

What would a basic SQL query look like? Select one: a. SELECT * FROM DATA b. SELECT * OF DATA c. CHOOSE * FROM DATA d. PRINT * OF DATA e. LIST * FROM DATA

a. SELECT * FROM DATA

What is the function of the SQL GROUP BY statement? Select one: a. The SQL GROUP BY clause can be used in a SELECT statement to collect data across multiple records and group the results by one or more columns. b. The SQL GROUP BY clause cannot be used in a SELECT statement. c. The SQL GROUP BY clause can be used in a SELECT statement to form a natural join between relations. d. The SQL GROUP BY clause can be used in a SELECT statement to combine one or more columns. e. The SQL GROUP BY clause can be used in a SELECT statement to avoid data inconsistencies.

a. The SQL GROUP BY clause can be used in a SELECT statement to collect data across multiple records and group the results by one or more columns.

What is the difference between a full backup and a differential backup? Select one: a. The full backup backs up all data, while the differential backup only backs up the difference from a previous full backup. b. The full backup fully backs up all differences from a previous full backup, while the differential backup only backs that up partly. c. The full backup backs up fully the previous backup of the full data, while the differential backup differentiates fully the difference of the full differential backup. d. The full backup backs up all data, while the differential backup only backs up the difference from a previous differential backup. e. The full backup backs up all data, while the differential backup only is a backup of the backup for emergency purpose.

a. The full backup backs up all data, while the differential backup only backs up the difference from a previous full backup.

What is a Cardinality? Select one: a. The number of how many entities in a database are associated with a given entity. b. The number of entities in a database. The number of entities in a database. c. The number of Cardinals that use databases. d. The total number of possible associations in a database. e. The maximum number of concurrent queries in a database.

a. The number of how many entities in a database are associated with a given entity.

What happens if a validation of a transaction fails? Select one: a. The transaction gets rolled back. b. The transaction fails and enters into a deadlock. c. The transaction gets postponed. d. The transaction gets earmarked as possibly problematic but completes anyway. e. The database gets corrupted and all data is lost.

a. The transaction gets rolled back.

What do you call a system's main memory or system cache? Select one: a. Volatile storage b. Non-volatile storage c. Stable storage d. Shadow storage e. Phantom storage

a. Volatile storage

When can an aborted transaction be restarted? Select one: a. When the transaction itself is correct but was aborted by a software or hardware error. b. When the transaction was aborted due to an internal error in the transaction logic. c. When the transaction failed because of a division by zero. d. When the transaction would have caused data to be corrupted. e. When the transaction made no sense.

a. When the transaction itself is correct but was aborted by a software or hardware error.

What is the function of OLAP (Online Analytic Processing)? Select one: a. The OLAP methodology provides normalization of data that have been generated in online applications. b. OLAP tools provide interactive analysis of data, for example to help build decision support systems. c. OLAP provides the database programmer with specific debugging routines. d. OLAP is an interface protocol to connect databases with each other, so queries can be cascaded. e. OLAP is the technique used for database system design used on mobile and laptop computers.

b. OLAP tools provide interactive analysis of data, for example to help build decision support systems.

What happens if you turn on Native Audit for databases? Select one: a. Security may be reduced but performance is enhanced. b. Performance may be reduced but security is enhanced. c. Security and performance are both enhanced. d. Security and performance are both reduced. e. None of the above.

b. Performance may be reduced but security is enhanced.

Which elements does an object-oriented data model include? Select one: a. abstraction, inheritance, and object action b. encapsulation, methods (functions), and object identity c. dynamic linked objects, library access (DLL's), and pointers d. big data capacity, recursive search, and normalized data e. objects (functions), actions (operations), and subjects (users)

b. encapsulation, methods (functions), and object identity

What is a structure described in a formal language supported by the database management system? Select one: a. A database process b. A database transaction c. A database schema d. A database query e. A database dump

c. A database schema

Due to a malfunction in the coffee maker, your company's data center burns down. Fortunately, everything is safely stored elsewhere in a backup server. Which security objective still gets compromised? Select one: a. Usability b. Privacy c. Availability d. Atomicity e. Nonrepudiability

c. Availability

How can you test a schedule for conflict serializability? Select one: a. By counting the number of transactions. If the number is odd, the schedule is conflict serializable. b. By counting the number of transactions. If the number is even, the schedule is conflict serializable. c. By drawing a precedence graph. A schedule is conflict serializable if its precedence graph has no cycle. d. By running the schedule. If there is no error, the schedule is conflict serializable. e. By checking if there are the same amount of write as read operations.

c. By drawing a precedence graph. A schedule is conflict serializable if its precedence graph has no cycle.

What happens when you extract patterns and knowledge from large data sets? Select one: a. Data Collisions b. Data Tracking c. Data Mining d. Data Warehousing e. Data Collapse

c. Data Mining

You are the database admin of your company. Unfortunately, your data center building is on fire. However, you took the best possible precautions and you can calm down your boss. Why? Select one: a. Due to a smart disaster recovery plan, the data are saved on magnetic tape. b. Disaster recovery plan or not, the data are not that important anyway. c. Due to a smart disaster recovery plan, you stored a mirror version of the data in another building across town. d. Due to a smart disaster recovery plan, you did the latest full backup only a month ago. e. Due to a smart disaster recovery plan, you have UPS (Uninterrupted Power Supply) installed.

c. Due to a smart disaster recovery plan, you stored a mirror version of the data in another building across town.

Which of the following is NOT a type of access or manipulation for data queries? Select one: a. Retrieval of Information stored in the database b. Insertion of new information into the database c. Interpretation of information stored in the database d. Deletion of information from the database e. Modification of information stored in the database

c. Interpretation of information stored in the database

LBAC means Label-based Access Control. Regarding databases, an additional and more recent meaning of the same acronym has been established. What is it? Select one: a. Least Bytes Access Control b. Lossless Bias Access Control c. Lattice-based Access Control d. List-based Access Control e. Least Bad Access Control

c. Lattice-based Access Control

What is LDAP? Select one: a. Less Data with Active Problems b. Little Density Accumulated Permutation c. Lightweight Directory Access Protocol d. Loss and Discovery Announcement Protocol e. List Doctoring Allure Procedure

c. Lightweight Directory Access Protocol

You want to run a full backup of a hard drive in one of your company's computers. How do you best do that? Select one: a. You save everything on a pile of floppy disks. b. You mark the data that you think are important and save those on a USB drive. c. You create a mirror image of that hard drive and save it on a reliable storage medium. d. You save all open documents at least once a day. e. You rely on the assumption that the company's commercial insurance will cover any cost involved with data loss

c. You create a mirror image of that hard drive and save it on a reliable storage medium.

What do you call a transaction that is responsible for a deadlock and has been chosen to be rolled back? Select one: a. A witness b. A hostage c. A criminal d. A victim e. A felon

d. A victim

What needs to be done with respect to personnel getting access to the database Select one: a. Performance monitoring b. Privacy and Protection c. Data integrity routines d. Authorization and Authentication e. Data Normalization

d. Authorization and Authentication

What do you call the component of a system that is responsible for limiting its performance? Select one: a. Riverbend b. Waterfall c. Tombstone d. Bottleneck e. Corkscrew

d. Bottleneck

What factors are commonly seen as important for finding the right backup solution? Select one: a. Ergonomics, Security, Accessibility and Usability b. Atomicity, Consistency, Integrity and Durability c. Hardware, Software and Middleware d. Capacity, Reliability, Extensibility, Speed and Cost e. Fail safety, Effectivity and Efficiency

d. Capacity, Reliability, Extensibility, Speed and Cost

What is the meaning of DDL? Select one: a. Double Data Logic b. Delta Dynamic List c. Data Dynamic Language d. Data Definition Language e. Data Dynamic Logic

d. Data Definition Language

What acronym is commonly used for the "Hypertext Transfer Protocol"? Select one: a. HTPT b. HPPT c. HYPTP d. HTTP e. HPTP

d. HTTP

What is the function of access control? Select one: a. It provides 100% database security. b. It ensures an error-free data quality. c. It controls the access of the database to the user. d. It controls access of the user to the database. e. It enables a regular backup of the database.

d. It controls access of the user to the database.

What happens in the validation phase of a transaction? Select one: a. It tests for conflicts of any kind. b. It tests for data corruption and aborts the transaction if it finds a problem. c. It creates an additional transaction to check if the transaction can be rolled back. d. It tests whether the transaction causes a violation of serializability. e. It deletes the data modified by the transaction and overwrites them with default values.

d. It tests whether the transaction causes a violation of serializability.

What kind of Access Control method can be used instead of RBAC without losing any functionality? Select one: a. Mnemonic Access Control b. Mannerism Access Control c. Manifested Access Control d. Mandatory Access Control e. Maximal Access Control

d. Mandatory Access Control

Which of the following are the levels of data abstraction? Select one: a. Physical level, protection level and access level b. Logical level, level of perception and action level c. Physical level, logical level and application level d. Physical level, logical level and view level e. Physical level, logical level and event level

d. Physical level, logical level and view level

What is the difference between a differential backup and an incremental backup? Select one: a. The differential backup backs up the difference between the incremental and the differential backup, while the incremental backup backs up the difference between the incremental and the differential backup. b. The differential backup and the incremental backup are the same. c. The differential backup helps backup data that are difficult to back up, while the incremental backup helps backup data that are increased in size over what is normal capacity. d. The differential backup backs up the data that are different from the previous full backup, while the incremental backup backs up the data that are different from the previous incremental or differential backup. e. The differential backup backs up all data, while the incremental backup backs up only some of the data.

d. The differential backup backs up the data that are different from the previous full backup, while the incremental backup backs up the data that are different from the previous incremental or differential backup

What does the acronym URL stand for? Select one: a. United Resource Locator b. Universal Resource Locator c. Ubiquitous Resource Locator d. Uniform Resource Locator e. Unique Resource Locator Incorrect

d. Uniform Resource Locator

If you just save your data on a heap of CDs, DVDs and unlabeled thumb drives, this is, strictly speaking, also a form of backup. What is it called? Select one: a. Differential Repository b. Incremental Repository c. Reverse Delta Repository d. Unstructured Repository e. Holographic Repository

d. Unstructured Repository

What is the difference between shared-mode and exclusive lock? Select one: a. When there is a shared-mode lock, the transaction cannot write and read the data item, where in an exclusive lock, the transaction can both write and read the data item. b. When there is a shared-mode lock, the transaction cannot read the data item, where in an exclusive lock, the transaction can write the data item. c. When there is a shared-mode lock, the transaction can write and read the data item, where in an exclusive lock, the transaction can write but not read the data item. d. When there is a shared-mode lock, the transaction can read but not write the data item, where in an exclusive lock, the transaction can both write and read the data item. e. When there is a shared-mode lock, the transaction can write and read the data item, where in an exclusive lock, the transaction can also write and read the data item.

d. When there is a shared-mode lock, the transaction can read but not write the data item, where in an exclusive lock, the transaction can both write and read the data item.

If you wish to observe a database to ensure nothing strange happens with user access and the data, what do you best do as a first step? Select one: a. You shut down the database. b. You delete the data. c. You contact the users. d. You run a database audit. e. You do nothing.

d. You run a database audit.

You want to determine the cardinality of a database that matches persons with (official) ID cards. From a government perspective, what would be the ideal cardinality for a relation Person - ID card? Select one: a. many to any b. many to many c. one to many d. one to one e. any to any

d. one to one

What is the difference between an instance and a schema? Select one: a. The collection of information stored in the database at a particular moment is called a schema of the database. The overall design of the database is called the database instance. b. The collection of information stored in the database at any time is called an instance of the database. The overall design of the database is called the database schema. c. The relations and entities stored in the database that have a one-to-many cardinality are called an instance of the database. The overall collection of data in the database is called the database schema. d. The collection of particular moments in the database are called an instance of the database. The overall duration of the database is called the database schema. e. The collection of information stored in the database at a particular moment is called an instance of the database. The overall design of the database is called the database schema.

e. The collection of information stored in the database at a particular moment is called an instance of the database. The overall design of the database is called the database schema.


Kaugnay na mga set ng pag-aaral

Mark Twain and Regionalism Study Guide

View Set

INSY 3330 E-Commerce Assignment 2 & 3

View Set

prepU Nursing Concepts- Nursing Process

View Set

Differences, Perceptions, and Attributions Wk2 Notes

View Set

Chapter 2 Section 2: Babylonia and Assyria

View Set