Chapter 9

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of these is NOT one of the cumulative results that show the importance of the database administrators? Optimizing data Increasing data security Providing data integrity Increasing data redundancy

Tool to manage databases

Where is a multi-user database typically located? The desktop computer of the database administrator A central computer server A laptop computer which is used by multiple users A USB flash drive that is past around the office A desktop computer of one of the employees

A central computer server

Which of the following statements are true about database locks? I. The two basic types of locks used in databases are read locks and write/update locks II. Read locks are not shareable, or exclusive, in nature III. Write/Update locks are shareable or non-exclusive in nature IV. Read locks are shareable but write/update locks are exclusive II and III I and III I and II I and IV

I and IV

Which of the following is NOT a property of database transactions? Atomicity Durability Insulation Consistency

Insulation

Database security management: is the processes and procedures used to detect security breaches is the collection of processes and procedures used to protect data and database systems includes the techniques used to manage database user access details the corporate responsibility of management to secure data

is the collection of processes and procedures used to protect data and database systems

Persistence is an object characteristic that denotes its _____. data lifetime method class

lifetime

Persistence is the ability of a process to survive even after its _____ are killed. partner processes child processes sub-processes parent processes

parent processes

What responsibility of a database administrator is used to fulfill contingency planning requirements in case of disaster? None of the answers is correct Data optimization Data integrity Backup and Recovery

Backup and Recovery

Which of the following processes need to be persistent for proper functioning of the system? Core system processes Spreadsheets Microsoft Word documents PowerPoint presentations

Core system processes

Where would you define the type of data that you need to secure within the database security policy? Access Control Information Classification Authentication Database User Management

Information Classification

The initial value of the Bonus field is 'N' and Dept field is 'FIN' for the record with the EmpID '12345' in the table Employee. What would be the values of both fields after the below transactions are executed? BEGIN TRANSACTION UPDATE Employee SET Bonus = 'Y' WHERE EmpID = '12345'; COMMIT TRANSACTION BEGIN UPDATE Employee SET Dept = 'IT' WHERE EmpID = '12345'; ROLLBACK TRANSACTION Bonus has value 'N and Dept has value 'IT' Bonus has value 'Y' and Dept has value 'FIN' Bonus has value 'N' and Dept has value 'FIN' Bonus has value 'Y' and Dept has value 'IT'

Bonus has value 'Y' and Dept has value 'FIN'

Which of the following would be an example of the application of the principle of the least-privileged user account? A receptionist given access to modify personal particulars of employees. Her job role only requires her to be able to retrieve contact details of employees. Programmers given access to view and change financial information kept in a database. A temporary worker assigned the DBA privileges as he/she may have some necessary skills to backup the regular DBA. Interns in the IT department assigned rights only to the Test database system but explicitly denied any access to the production systems.

Interns in the IT department assigned rights only to the Test database system but explicitly denied any access to the production systems.

SQL was released by _____, and created by _____. IBM, Oracle IBM, Dell Oracle, IBM Dell, Oracle

Oracle, IBM

Which of the following is NOT a feature of persistent data? Persistent data is stable. Persistent data is time independent. Persistent data is non-volatile Persistent data is dynamic.

Persistent data is dynamic.

A user executes a long database transaction.The initial command is to determine the number of records to be processed in the given range. An SQL command using the COUNT function is executed and the number of affected records displayed. A number of other computations are then executed to update field values - no new records are added or existing ones deleted within this range. The last command executed before the transaction ends is to determine again the number of records processed. This time, when the statement with the COUNT function is executed, a value which differs from the original is obtained. What is this phenomena known as? Database synchronization issues Dirty reads Non-repeatable reads Phantom rows

Phantom rows

Which of these is NOT a responsibility of a database administrator? Configuration Fine tuning Capacity planning Procurement

Procurement

A fast way to get a disrupted system that has been breached up and running is to: Restore an updated data backup Correct the damage to the data Investigate and repair all system loop holes Change the system administrators

Restore an updated data backup

In a multi-user database environment, which of the following has no consequence on the database? Durability of transactions Atomicity of transactions Sequence of transaction processing Isolation of concurrent transactions

Sequence of transaction processing

Which of the following describes an SQL cursor? Cursors are not related to SQL. A field within a database. The contents of a database. A position within a database.

A position within a database.

_____ limits who gains access to the database while _____ limits what a user can access within the database. Access control, database security Data access, user monitoring Access authentication, view definition Access authentication, user definition

Access authentication, view definition

Which of the following operations does SQL allow you to perform? Sorting Searching Storing All of the answers are correct.

All of the answers are correct.

Who is responsible for abiding by the database security policy? All users of the database Vendor contacts DBAs and administrators Managers and CEOs

All users of the database

How many people can, in theory, use a multi-user distributed databases? One user at every site As many as there are licenses for the database management software One database manager at every user Anyone at any site who has been authorized by the database manager Only the central database manager

Anyone at any site who has been authorized by the database manager

Which of the following would most likely be found in the sub-section that addresses availability, backup, and recovery? Changes shall be approved by the data owner The DBA is responsible for capacity planning The DBA shall have admin rights on the OS Testing of offsite tapes will happen yearly

Testing of offsite tapes will happen yearly

Which of the following items would probably NOT be maintained in a typical database documentation? The data dictionary and related information of the database. The security setup information and responsibility matrix of the database. The number of records and size of tables in the database. The schedules of important system/database tasks like the backup schedules and the upgrade schedules.

The number of records and size of tables in the database.

Which of the following is NOT a feature of persistent data? Recoverable Time dependent Non-volatile Stays in original format

Time dependent

Which of the following is NOT the objective of maintaining a proper and updated set of documentation for databases? To ensure that there is a proper reference for training of new staff For audit/regulatory purposes To keep track of and maintain a record of all access to the database by users To ensure that it is possible to re-construct the database in the event of a disaster

To keep track of and maintain a record of all access to the database by users

What is a DBMS? A database administrator A type of database Tool to manage databases A spreadsheet application

Tool to manage databases

Isolation of the transactions is achieved by storing updates permanently. avoiding simultaneous transactions. preventing system failure. concurrency control.

concurrency control.

While creating access permissions in the database, which is the preferred option? Assigning access to individual users Assigning roles to tables Creating roles, groups and assigning access to them Assigning specific table access to users

Creating roles, groups and assigning access to them

In which section of the database security policy would you most likely find the following: "Staff who violate the access policy will be put on paid leave while access is reviewed" Audit Trails Enforcement Change Control Authentication and Identification

Enforcement

When integrity constraints are maintained before and after a transaction, the database is said to be in a state of concurrency. consistency. continuity. completeness.

consistency.

A transaction is required to update a number of fields in a particular record in a given database table. There should not be any dirty reads occurring while this transaction is in progress. What is the correct type of database lock to use in this situation? Exclusive write lock Exclusive read lock Shared read lock Shared write lock

Exclusive write lock

_____ are threats to a database system. Viruses and access controls Viruses and audit trails Hackers and SQL injection attacks User authentications and the internet

Hackers and SQL injection attacks

In database terminology, which of the following should be implemented as a transaction? I. A database operation to transfer funds from one account to another II. A database operation to create a new purchase order which consists of a header and detail file stored in separate tables. III. A database operation to update a single field item in a single database table, like the birth date or contact number of a person IV. A database operation to query a database about the existence of records satisfying a search criteria I and IV II and IV I and II I and III

I and II

In databases, what are the two phases defined in the two-phased locking protocol? I. Growing/Expanding phase II. Discovery phase III. Shrinking phase IV. Implementation phase II and IV I and II I and III II and III

I and III

Which of the following statements regarding transactions are correct ? I. A transaction is an indivisible unit of work where either everything is completed or all changes reverted to the original state II. A transaction consists of only a single SQL statement III. A transaction can be used together with database locks to manage the side-effects effects of concurrency I, II and III I and II I and III II and III

I and III

What is the first cursor command executed in code? OPEN DECLARE CURSOR CLOSE FETCH

DECLARE CURSOR

Which of the following is NOT a command affected by cursors? DELETE FETCH DEDUCE SET

DEDUCE

What is the primary advantage of using a distributed database? Storage capacity needs are reduced Multiple users can use the same database at the same time Data access and faster processing Data management is much simpler Security is improved

Data access and faster processing

Which of the following statements is false with respect to distributed databases? Users may not be aware they are using a distributed database. Data at each site is under control of the DBMS. Data at any site is only available to users at that site. Data can in theory be located on a computer network site anywhere in the world. Multiple computer network sites are connected by a communication system.

Data at any site is only available to users at that site.

_____ is the process of transforming data into an unreadable form to anyone who does not know the key. Data encryption Data security Data authentication Database security management

Data encryption

What is a collection of databases that work together called? Database server Data warehouse Distributed database Database management system Multi-user database

Data warehouse

Which of the following is a security principle that can be used to manage access to database objects? IP addresses of the users Designations of the users User passwords Database roles and users

Database roles and users

Which of the following policy helps to ensure that unwanted access is limited in the database? A DBA account should be created for each table Default accounts should be removed A user account must remain open indefinitely Default accounts should be limited

Default accounts should be removed

A user starts a new database transaction. The first statement executed was to find the existence of a record with the value of 'E0001' for a given field. This field is the primary key in the table. The query returned details of this record. Later on in the same transaction, another statement was executed to update the same record. However, no update was done and the system informed that there is no existence of such a record with the value of the field being 'E0001'. Which database concurrency issue is described here? Phantom rows Synchronization problem Non-repeatable reads Dirty reads

Dirty reads

Database transaction durability ensures that in the event of a system failure a transaction is not lost once it has been committed. a transaction is saved before the failure occurs. a transaction is reversed before it is executed. a transaction is completed uninterrupted.

a transaction is not lost once it has been committed.

Pre-implementation tasks in database administration include: all of these answer are correct a feasibility study installation and implementation activities capacity planning

all of these answer are correct


संबंधित स्टडी सेट्स

Biological approach - aggression NF

View Set

UNIT #14: Types and Characteristics of Pooled Investments

View Set

Atherosclerosis and Other Arterial Diseases

View Set

Chapter 2: The Founding and the Constitution

View Set

27 Grievances of the Declaration of Independence

View Set

EAQ Chronic Inflammatory Bowel Disorders

View Set

Ch. 25 Drug Therapy for Seizures

View Set