DB Chapter 6 MULTIPLE

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When Microsoft Access 2010 secures a database with just a password, the database file will be a(n): A) *.accdb file. B) *.accdc file. C) *.accde file. D) *.mdb file. E) *.mdw file.

A) *.accdb file.

Which type of lock assumes that no conflicts will occur? A) Optimistic locks B) Granular locks C) Explicit locks D) Shared locks E) Open locks

A) Optimistic locks

An ACID transaction is one that is: A) atomic. B) consistent. C) isolated. D) durable. E) All of the above

E) All of the above

When Microsoft Access 2010 secures a database just by storing the database in a trusted location, the database file will be a(n): A) *.accdb file. B) *.accdc file. C) *.accde file. D) *.mdb file. E) *.mdw file.

A) *.accdb file.

What is the least restrictive isolation level that will prevent dirty reads? A) Read Committed B) Serializable C) Read Uncommitted D) Atomic Read E) Repeatable Read

A) Read Committed

What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a different transaction since the prior read? A) Nonrepeatable reads B) Phantom reads C) Dirty reads D) Serialized reads E) Unlocked reads

B) Phantom reads

What is the least restrictive isolation level that will prevent phantom read problems? A) Read Committed B) Serializable C) Read Uncommitted D) Atomic Read E) Repeatable Read

B) Serializable

What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database? A) Nonrepeatable reads B) Phantom reads C) Dirty reads D) Serialized reads E) Unlocked reads

C) Dirty reads

Which of the following is not true of database recovery through reprocessing? A) Reprocessing makes use of a database save. B) Reprocessing takes the same amount of time as did processing in the first place. C) Reprocessing will always return the database to its exact previous state. D) Reprocessing requires a record of all transactions since the last time the database was saved. E) All of the above are true of reprocessing.

C) Reprocessing will always return the database to its exact previous state.

When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be, the transaction is said to be: A) consistent. B) isolated. C) atomic. D) locked. E) logical.

C) atomic.

The purpose of concurrency control is to: A) ensure that each form has a corresponding report. B) ensure that ASPs do not duplicate JSPs. C) ensure that one user's work does not interfere with another's. D) ensure that stored procedures do not invoke triggers. E) ensure that triggers do not invoke stored procedures.

C) ensure that one user's work does not interfere with another's.

Ensuring that each SQL statement independently processes consistent rows is known as: A) transaction level consistency. B) independent consistency. C) statement level consistency. D) process level consistency. E) serializable consistency.

C) statement level consistency.

Which of the following is true about a shared lock? A) It is more restrictive than an implicit lock. B) It allows only two transactions to update a record simultaneously. C) It locks the item from all access. D) It allows reads to the locked item. E) It must use a two-phase locking scheme.

D) It allows reads to the locked item.

A point of synchronization between the database and the transaction log is called a(n): A) before-image. B) after-image. C) recovery. D) checkpoint. E) None of the above

D) checkpoint.

The term DBA refers to the: A) database accessor. B) database auditor. C) data business auditor. D) database administrator. E) data business administrator.

D) database administrator.

Preventing multiple applications from obtaining copies of the same record when the record is about to changed is called: A) serialized reading. B) lost updating. C) concurrent processing. D) resource locking. E) block factoring.

D) resource locking.

The recovery technique in which the database is returned to a known state and then all valid transactions are reapplied to the database is known as: A) reprocessing. B) rollback. C) transaction logging. D) rollforward. E) checkpointing.

D) rollforward.

Additional DBA responsibilities include: A) problem and error reporting. B) requests of changes to existing systems. C) controlling database configuration. D) maintaining appropriate documentation. E) All of the above

E) All of the above

Computer systems fail for which of the following reasons? A) Hardware breaks. B) Electrical power fails. C) Programs have bugs. D) People make mistakes. E) All of the above

E) All of the above

Which of the following is not a means of processing databases? A) Internet applications using ASP B) Internet applications using JSP C) Applications invoking stored procedures D) Programs coded in C# E) All of the above are means of processing a database.

E) All of the above are means of processing a database.

What is the least restrictive isolation level that will prevent nonrepeatable reads? A) Read Committed B) Serializable C) Read Uncommitted D) Atomic Read E) Repeatable Read

E) Repeatable Read

Whether a lock applies to data at the record level, page level, table level, or database level is referred to as: A) lock exclusivity. B) lock sharing. C) lock phasing. D) serializable locking. E) lock granularity.

E) lock granularity.


Ensembles d'études connexes

ENTREP - Week 1-2: The Concept of Entrepeneurship

View Set

Logistics Topic 1: What is Logistics?

View Set

Volume 4, Chapters 1-5: Pre-Test

View Set

Historical Theology Focus Questions

View Set

MACRO FINAL - ALL PREVIOUS TEST QUESTIONS]

View Set

29:Care of the Hospitalized Child PrepU's

View Set