Database Management: Quiz 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When a transaction reads a row that has been changed, but the change has not been committed, this is known as a ________. Dirty read Clean read Nonrepeatable read Phantom read

Dirty read

Which of the following is not true about two-phased locking? Has a shrinking phase Cannot obtain a new lock once a lock has been released Has a growing phase Uses only shared locks

Uses only shared locks

Locks that are placed assuming that a conflict will occur are called ________. optimistic locks explicit locks pessimistic locks implicit locks

pessimistic locks

One remedy for the inconsistencies caused by concurrent processing is ________. resource locking concurrency checkpointing rollback

resource locking

Measures that are taken to prevent one user's work from inappropriately influencing another user's work are called ________. checkpoint database recovery database logging concurrency control

concurrency control

Once processing rights have been defined, they may be implemented at any of these levels except ________. application network data operating system

data

The task of diagnosing errors due to changes in the database structure is eased by ________. database structure change documentation configuration control formal policies for requesting changes rollback analysis

database structure change documentation

The situation that occurs when two users are each waiting for a resource that the other person has locked is known as a(n) ________. inconsistent read problem lost update problem checkpoint deadlock

deadlock

A lock placed automatically by the DBMS is called a(n) ________ lock. explicit exclusive shared implicit

implicit

The situation that occurs when one user's changes to the database are lost by a second user's changes to the database is known as the ________. inconsistent read problem lost update problem deadly embrace problem inconsistent write problem

lost update problem

Locks that are placed assuming that a conflict will not occur are called ________. shared pessimistic optimistic dynamic

optimistic

Which of the following is not true of DBMS security features? Objects have many permissions. Both users and roles can have many permissions. A role may be assigned to only one user. Users may be assigned to one or more roles.

A role may be assigned to only one user.

Which type of data repository is composed of metadata that is created automatically as the system components are created? Active Dynamic Automatic Passive

Active

When two transactions are being processed against the database at the same time ________. they are called concurrent transactions they are usually interleaved they always result in a lost update problem Both they are called concurrent transactions and they are usually interleaved are correct

Both they are called concurrent transactions and they are usually interleaved are correct

Which of the following is true of forward only cursors? Changes made by the transaction are visible only if they occur on rows ahead of the cursor. Current values for each row are retrieved when the application accesses a row. It requires the greatest overhead of any cursor type. All changes of any type from any source are visible.

Changes made by the transaction are visible only if they occur on rows ahead of the cursor.

Requiring all application programs to lock resources in the same order is a technique for preventing what problem? Lost update Exclusive locks Correct Deadlock Concurrent update

Correct

Which of the following is true about making changes to the database structure? Changes do not produce unexpected results because the DBA will have investigated the change thoroughly before implementing it. Formal policies and procedures for requesting a change are not used because they are too limiting. Documentation of when the change was made, how it was made, and why it was made must be created. The DBA need not get input from users on the issue because it is a technical decision.

Documentation of when the change was made, how it was made, and why it was made must be created.

Which of the following would a DBA typically NOT do in managing the DBMS? Tune DBMS product options to accommodate other software in use Install new versions of the operating system, as needed Evaluate new DBMS product features Analyze system performance statistics

Install new versions of the operating system, as needed

Which of the following is not true about locks? Locks may have a database-level granularity. Locks may have a table-level granularity. Locks with small granularity cause more conflicts. Locks with large granularity are easier for the DBMS to administer.

Locks with small granularity cause more conflicts.

When a transaction rereads data that has been changed and finds changes due to committed transactions, this is known as a ________. Clean read Dirty read Phantom read Nonrepeatable read

Nonrepeatable read

Which of the following would not be contained in a transaction log? Permissions Type of operation Time of the action Before images

Permissions

Which of the following is allowed by "Repeatable Read Isolation"? Nonrepeatable reads Dirty reads Phantom reads Both Nonrepeatable reads and Dirty reads are correct

Phantom reads

Which of the following is allowed by "Repeatable Read Isolation"? Nonrepeatable reads Dirty reads Phantom reads Both Nonrepeatable reads and Dirty reads are correct

Phantom reads

Which of the following cannot be enforced in the DBMS or application programs? Security Cursors Processing rights Processing responsibilities Transaction isolation

Processing responsibilities

Which type of lock still allows other transactions to have read-only access to the locked resource? Exclusive lock Shared lock Implicit lock Explicit lock

Shared lock

Which of the following is not true of data repositories? They may be virtual. They may contain metadata about database applications. They may contain metadata about users. They are usually created after the database has been implemented and optimized for performance.

They are usually created after the database has been implemented and optimized for performance.

Which of the following is not a database administration responsibility of a DBA? Managing the DBMS Writing the applications Maintaining the data repository Managing the database structure

Writing the applications

Recovering a database via rollforward involves ________. restoring the database from the save and reprocessing all the transactions since the save restoring the database from the save and reapplying all the changes made by transactions since the save undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure re-creating the database by re-entering all of the data from the beginning, and then reprocessing all of the transactions

restoring the database from the save and reapplying all the changes made by transactions since the save

Recovering a database via reprocessing involves ________. recreating the database by reentering all of the data from the beginning, and then reprocessing all of the transactions undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure restoring the database from the save and reapplying all the changes made by transactions since the save restoring the database from the save and reprocessing all the transactions since the save

restoring the database from the save and reprocessing all the transactions since the save

A series of actions to be taken on the database such that either all actions are completed successfully, or none of them can be completed, is known as a ________. lock checkpoint log transaction

transaction

Ensuring that all rows impacted by the actions of a transaction are protected from changes until the entire transaction is completed is called ________. durable transactions transaction level consistency optimistic locking statement level consistency

transaction level consistency

Recovering a database via rollback involves ________. restoring the database from the save and reapplying all the changes made by transactions since the save undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure re-creating the database by re-entering all of the data from the beginning and, then reprocessing all of the transactions restoring the database from the save and reprocessing all the transactions since the save

undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure


Ensembles d'études connexes

Anatomy Chapter 5 Review Questions

View Set

Saunders | Ethical & Legal Issues

View Set

PC Pro CHapter 3 (3.8.3.14) Questions

View Set

Lifespan Development: Chapter One

View Set

Ch10 - Collecting Data by Observation

View Set