Deck 9: Managing Multiuser Databases

ملء الشاشة (f)
exit full mode
سؤال
Explicit locks are locks that are placed automatically by the DBMS.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Changes in the database structure usually involve only one application.
سؤال
An exclusive lock locks the item from access of any type.
سؤال
The DBA is responsible for managing changes to the database structure,but is rarely involved in the original design of the structure.
سؤال
Database administration is more important but less difficult in multiuser database systems than in single-user database systems.
سؤال
Locks placed by a command issued to the DBMS from the application program are called explicit locks.
سؤال
An exclusive lock locks the item from change but not from read access.
سؤال
One important reason for documenting changes to the database structure is for diagnosing errors.
سؤال
Locks with large granularity are easy for the DBMS to administer but frequently cause conflicts.
سؤال
A transaction is a group of alternative database actions,from which the database can choose to perform only one of them.
سؤال
Locks placed automatically by the DBMS are called implicit locks.
سؤال
Resource locking is one remedy to the lost update problem.
سؤال
The size of a lock is referred to as the lock granularity.
سؤال
A transaction is sometimes called atomic because it is performed as a unit.
سؤال
The DBA has to find a balance between the conflicting goals of maximizing availability of the database to users and protecting the database.
سؤال
Database administration tasks have to be performed for single-user,personal databases.
سؤال
A transaction is a series of actions to be taken on the database such that either all of them are performed successfully or none of them is performed at all.
سؤال
Concurrency control measures are taken to ensure that one user's work has absolutely no influence on another user's work.
سؤال
In general,the overall responsibility of the DBA is to facilitate the development and use of the database system.
سؤال
The database is most vulnerable to failure after a change to its structure.
سؤال
In two-phase locking,all locks are released during the contracting phase.
سؤال
With optimistic locking,the assumption is made that no conflict will occur.
سؤال
A dynamic cursor saves primary key values when the cursor is opened and retrieves the values for each row as the application program accesses it.
سؤال
In two-phase locking,all locks are obtained during the growing phase.
سؤال
Repeatable Read isolation is the most restrictive level of isolation.
سؤال
With pessimistic locking,the assumption is made that a conflict will occur.
سؤال
Two-phased locking is a scheme for achieving serializability of transactions.
سؤال
Transaction level consistency means that all rows impacted by any actions in a transaction are protected from change during the entire transaction.
سؤال
Nonrepeatable reads occur when a transaction rereads data it has previously read and finds modifications or deletions caused by a committed transaction.
سؤال
The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times.
سؤال
The transaction boundaries are the essential information that the DBMS needs from the application programs to enforce different locking strategies.
سؤال
Requiring all application programs to lock resources in the same order is one way of preventing a deadlock condition.
سؤال
Resources are locked for a shorter amount of time with pessimistic locking because the transaction is pre-processed.
سؤال
In general,optimistic locking is the preferred technique for Internet databases.
سؤال
A static cursor processes a snapshot of the relation that was taken when the cursor was opened.
سؤال
A dirty read happens when one transaction reads a changed record that has not been committed to the database.
سؤال
Two-phased locking has a growing phase and a shrinking phase.
سؤال
A durable transaction is one for which all committed changes are permanent.
سؤال
According to ANSI SQL,the serializable isolation level will not allow phantom reads,dirty reads,and nonrepeatable reads.
سؤال
Resource locking must be carefully planned because most DBMS products cannot detect a deadlock condition.
سؤال
All commercial DBMS products use some version of "username and password" as part of their security features.
سؤال
A standby data repository is one which requires a person to generate the metadata and place it in the repository.
سؤال
A passive data repository is preferred over an active repository because it requires less human intervention.
سؤال
Reprocessing is normally the most convenient method for recovery after a system failure.
سؤال
A checkpoint is a point of synchronization between the database and the transaction log.
سؤال
Both rollforward and rollback require the use of a log of transaction results.
سؤال
Rollforward is a method of database recovery that restores the database save and all valid transactions since the save was reapplied.
سؤال
Which of the following is true about making changes to the database structure?

A)The DBA need not get input from users on the issue because it is a technical decision.
B)Formal policies and procedures for requesting a change are not used because they are too limiting.
C)Documentation of when the change was made,how it was made,and why it was made must be created.
D)Changes do not produce unexpected results because the DBA will have investigated the change thoroughly before implementing it.
E)If the database is properly designed,changes should not be necessary throughout the system's lifetime.
سؤال
The security provided by the DBMS often has to be augmented by additional security features within the application program.
سؤال
Rollforward and reprocessing are two different names for the same technique.
سؤال
An active data repository is one in which the metadata is automatically created as the system components are created.
سؤال
Copies of each database record or page after it was changed by a transaction that are saved for use in database recovery are called ghost images.
سؤال
Processing responsibilities should be documented and encoded into manual procedures.
سؤال
Which of the following is not a database administration responsibility of a DBA?

A)Managing the database structure
B)Managing data activity
C)Managing the DBMS
D)Maintaining the data repository
E)All of the above are database administration responsibilities of a DBA.
سؤال
In regard to database security,neither the DBMS nor the database applications can enforce processing responsibilities.
سؤال
Copies of each database record or page before being changed by a transaction that are saved for use in database recovery are called before images.
سؤال
The DBA should periodically analyze run-time statistics of database performance to help manage the DBMS.
سؤال
A "database save" is used to mark the end of a transaction.
سؤال
To support rollforward and rollback recovery,transactions must be written to a script before they are applied to the database.
سؤال
Processing rights may be implemented at the DBMS level.
سؤال
Which of the following is true of forward only cursors?

A)Current values for each row are retrieved when the application accesses a row.
B)All changes of any type from any source are visible.
C)Changes made by the transaction are visible only if they occur on rows ahead of the cursor.
D)Applications may scroll backward in the record set.
E)It requires the greatest overhead of any cursor type.
سؤال
Locks that are placed assuming that a conflict will not occur are called:

A)dynamic.
B)explicit.
C)implicit.
D)optimistic.
E)pessimistic.
سؤال
A series of actions to be taken on the database such that either all actions are completed successfully,or none of them can be completed,is known as a:

A)checkpoint.
B)log.
C)lock.
D)transaction.
E)concurrent.
سؤال
Requiring all application programs to lock resources in the same order is a technique for preventing what problem?

A)Concurrent update
B)Lost update
C)Deadlock
D)Exclusive locks
E)Growing phase locking
سؤال
One remedy for the inconsistencies caused by concurrent processing is ________.

A)lost updates
B)checkpointing
C)rollback
D)resource locking
E)concurrency
سؤال
Which type of lock still allows other transactions to have read-only access to the locked resource?

A)Exclusive lock
B)Shared lock
C)Two-phased lock
D)Explicit lock
E)Implicit lock
سؤال
A lock placed automatically by the DBMS is called a(n)________ lock.

A)exclusive
B)explicit
C)granular
D)implicit
E)shared
سؤال
Which of the following is not true about two-phased locking?

A)Can make transactions serializable
B)Uses only shared locks
C)Has a growing phase
D)Has a shrinking phase
E)Cannot obtain a new lock once a lock has been released
سؤال
Which of the following is not true about locks?

A)Locks with large granularity are easier for the DBMS to administer.
B)Locks with small granularity cause more conflicts.
C)Locks with large granularity produce fewer details for the DBMS to track.
D)Locks may have a table-level granularity.
E)Locks may have a database-level granularity.
سؤال
Ensuring that all rows impacted by the actions of a transaction are protected from changes until the entire transaction is completed is called:

A)statement level consistency.
B)optimistic locking.
C)transaction level consistency.
D)durable transactions.
E)ARID transactions.
سؤال
Which type of lock prevents all types of access to the locked resource?

A)Exclusive lock
B)Shared lock
C)Two-phased lock
D)Explicit lock
E)Implicit lock
سؤال
Which of the following is allowed by "Repeatable Read Isolation"?

A)Nonrepeatable reads
B)Dirty reads
C)Phantom reads
D)A and B
E)A,B,and C
سؤال
Measures that are taken to prevent one user's work from inappropriately influencing another user's work are called:

A)concurrency control.
B)checkpoint.
C)database recovery.
D)database logging.
E)interleaving.
سؤال
When a transaction reads a row that has been changed,but the change has not been committed,this is known as a ________.

A)Clean read
B)Dirty read
C)Nonrepeatable read
D)Phantom read
سؤال
The situation that occurs when one user's changes to the database are lost by a second user's changes to the database is known as the:

A)lost update problem.
B)deadly embrace problem.
C)inconsistent read problem.
D)inconsistent write problem.
E)deadlock problem.
سؤال
When two transactions are being processed against the database at the same time:

A)they are called concurrent transactions.
B)they are usually interleaved.
C)they always result in a lost update problem.
D)one must be rolled back.
E)A and B
سؤال
Locks that are placed assuming that a conflict will occur are called:

A)dynamic locks.
B)explicit locks.
C)implicit locks.
D)optimistic locks.
E)pessimistic locks.
سؤال
The situation that occurs when two users are each waiting for a resource that the other person has locked is known as a(n):

A)lost update problem.
B)deadlock.
C)inconsistent read problem.
D)inconsistent write problem.
E)checkpoint.
سؤال
The task of diagnosing errors due to changes in the database structure is eased by:

A)formal policies for requesting changes.
B)database structure change documentation.
C)rollback analysis.
D)configuration control.
E)None of the above.
سؤال
When a transaction rereads data that has been changed and finds changes due to committed transactions,this is known as a ________.

A)Clean read
B)Dirty read
C)Nonrepeatable read
D)Phantom read
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/102
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Managing Multiuser Databases
1
Explicit locks are locks that are placed automatically by the DBMS.
False
2
Changes in the database structure usually involve only one application.
False
3
An exclusive lock locks the item from access of any type.
True
4
The DBA is responsible for managing changes to the database structure,but is rarely involved in the original design of the structure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
5
Database administration is more important but less difficult in multiuser database systems than in single-user database systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
6
Locks placed by a command issued to the DBMS from the application program are called explicit locks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
7
An exclusive lock locks the item from change but not from read access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
8
One important reason for documenting changes to the database structure is for diagnosing errors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
9
Locks with large granularity are easy for the DBMS to administer but frequently cause conflicts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
10
A transaction is a group of alternative database actions,from which the database can choose to perform only one of them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
11
Locks placed automatically by the DBMS are called implicit locks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
12
Resource locking is one remedy to the lost update problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
13
The size of a lock is referred to as the lock granularity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
14
A transaction is sometimes called atomic because it is performed as a unit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
15
The DBA has to find a balance between the conflicting goals of maximizing availability of the database to users and protecting the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
16
Database administration tasks have to be performed for single-user,personal databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
17
A transaction is a series of actions to be taken on the database such that either all of them are performed successfully or none of them is performed at all.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
18
Concurrency control measures are taken to ensure that one user's work has absolutely no influence on another user's work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
19
In general,the overall responsibility of the DBA is to facilitate the development and use of the database system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
20
The database is most vulnerable to failure after a change to its structure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
21
In two-phase locking,all locks are released during the contracting phase.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
22
With optimistic locking,the assumption is made that no conflict will occur.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
23
A dynamic cursor saves primary key values when the cursor is opened and retrieves the values for each row as the application program accesses it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
24
In two-phase locking,all locks are obtained during the growing phase.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
25
Repeatable Read isolation is the most restrictive level of isolation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
26
With pessimistic locking,the assumption is made that a conflict will occur.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
27
Two-phased locking is a scheme for achieving serializability of transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
28
Transaction level consistency means that all rows impacted by any actions in a transaction are protected from change during the entire transaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
29
Nonrepeatable reads occur when a transaction rereads data it has previously read and finds modifications or deletions caused by a committed transaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
30
The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
31
The transaction boundaries are the essential information that the DBMS needs from the application programs to enforce different locking strategies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
32
Requiring all application programs to lock resources in the same order is one way of preventing a deadlock condition.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
33
Resources are locked for a shorter amount of time with pessimistic locking because the transaction is pre-processed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
34
In general,optimistic locking is the preferred technique for Internet databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
35
A static cursor processes a snapshot of the relation that was taken when the cursor was opened.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
36
A dirty read happens when one transaction reads a changed record that has not been committed to the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
37
Two-phased locking has a growing phase and a shrinking phase.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
38
A durable transaction is one for which all committed changes are permanent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
39
According to ANSI SQL,the serializable isolation level will not allow phantom reads,dirty reads,and nonrepeatable reads.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
40
Resource locking must be carefully planned because most DBMS products cannot detect a deadlock condition.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
41
All commercial DBMS products use some version of "username and password" as part of their security features.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
42
A standby data repository is one which requires a person to generate the metadata and place it in the repository.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
43
A passive data repository is preferred over an active repository because it requires less human intervention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
44
Reprocessing is normally the most convenient method for recovery after a system failure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
45
A checkpoint is a point of synchronization between the database and the transaction log.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
46
Both rollforward and rollback require the use of a log of transaction results.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
47
Rollforward is a method of database recovery that restores the database save and all valid transactions since the save was reapplied.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following is true about making changes to the database structure?

A)The DBA need not get input from users on the issue because it is a technical decision.
B)Formal policies and procedures for requesting a change are not used because they are too limiting.
C)Documentation of when the change was made,how it was made,and why it was made must be created.
D)Changes do not produce unexpected results because the DBA will have investigated the change thoroughly before implementing it.
E)If the database is properly designed,changes should not be necessary throughout the system's lifetime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
49
The security provided by the DBMS often has to be augmented by additional security features within the application program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
50
Rollforward and reprocessing are two different names for the same technique.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
51
An active data repository is one in which the metadata is automatically created as the system components are created.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
52
Copies of each database record or page after it was changed by a transaction that are saved for use in database recovery are called ghost images.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
53
Processing responsibilities should be documented and encoded into manual procedures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following is not a database administration responsibility of a DBA?

A)Managing the database structure
B)Managing data activity
C)Managing the DBMS
D)Maintaining the data repository
E)All of the above are database administration responsibilities of a DBA.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
55
In regard to database security,neither the DBMS nor the database applications can enforce processing responsibilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
56
Copies of each database record or page before being changed by a transaction that are saved for use in database recovery are called before images.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
57
The DBA should periodically analyze run-time statistics of database performance to help manage the DBMS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
58
A "database save" is used to mark the end of a transaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
59
To support rollforward and rollback recovery,transactions must be written to a script before they are applied to the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
60
Processing rights may be implemented at the DBMS level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which of the following is true of forward only cursors?

A)Current values for each row are retrieved when the application accesses a row.
B)All changes of any type from any source are visible.
C)Changes made by the transaction are visible only if they occur on rows ahead of the cursor.
D)Applications may scroll backward in the record set.
E)It requires the greatest overhead of any cursor type.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
62
Locks that are placed assuming that a conflict will not occur are called:

A)dynamic.
B)explicit.
C)implicit.
D)optimistic.
E)pessimistic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
63
A series of actions to be taken on the database such that either all actions are completed successfully,or none of them can be completed,is known as a:

A)checkpoint.
B)log.
C)lock.
D)transaction.
E)concurrent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
64
Requiring all application programs to lock resources in the same order is a technique for preventing what problem?

A)Concurrent update
B)Lost update
C)Deadlock
D)Exclusive locks
E)Growing phase locking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
65
One remedy for the inconsistencies caused by concurrent processing is ________.

A)lost updates
B)checkpointing
C)rollback
D)resource locking
E)concurrency
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
66
Which type of lock still allows other transactions to have read-only access to the locked resource?

A)Exclusive lock
B)Shared lock
C)Two-phased lock
D)Explicit lock
E)Implicit lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
67
A lock placed automatically by the DBMS is called a(n)________ lock.

A)exclusive
B)explicit
C)granular
D)implicit
E)shared
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
68
Which of the following is not true about two-phased locking?

A)Can make transactions serializable
B)Uses only shared locks
C)Has a growing phase
D)Has a shrinking phase
E)Cannot obtain a new lock once a lock has been released
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
69
Which of the following is not true about locks?

A)Locks with large granularity are easier for the DBMS to administer.
B)Locks with small granularity cause more conflicts.
C)Locks with large granularity produce fewer details for the DBMS to track.
D)Locks may have a table-level granularity.
E)Locks may have a database-level granularity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
70
Ensuring that all rows impacted by the actions of a transaction are protected from changes until the entire transaction is completed is called:

A)statement level consistency.
B)optimistic locking.
C)transaction level consistency.
D)durable transactions.
E)ARID transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
71
Which type of lock prevents all types of access to the locked resource?

A)Exclusive lock
B)Shared lock
C)Two-phased lock
D)Explicit lock
E)Implicit lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following is allowed by "Repeatable Read Isolation"?

A)Nonrepeatable reads
B)Dirty reads
C)Phantom reads
D)A and B
E)A,B,and C
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
73
Measures that are taken to prevent one user's work from inappropriately influencing another user's work are called:

A)concurrency control.
B)checkpoint.
C)database recovery.
D)database logging.
E)interleaving.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
74
When a transaction reads a row that has been changed,but the change has not been committed,this is known as a ________.

A)Clean read
B)Dirty read
C)Nonrepeatable read
D)Phantom read
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
75
The situation that occurs when one user's changes to the database are lost by a second user's changes to the database is known as the:

A)lost update problem.
B)deadly embrace problem.
C)inconsistent read problem.
D)inconsistent write problem.
E)deadlock problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
76
When two transactions are being processed against the database at the same time:

A)they are called concurrent transactions.
B)they are usually interleaved.
C)they always result in a lost update problem.
D)one must be rolled back.
E)A and B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
77
Locks that are placed assuming that a conflict will occur are called:

A)dynamic locks.
B)explicit locks.
C)implicit locks.
D)optimistic locks.
E)pessimistic locks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
78
The situation that occurs when two users are each waiting for a resource that the other person has locked is known as a(n):

A)lost update problem.
B)deadlock.
C)inconsistent read problem.
D)inconsistent write problem.
E)checkpoint.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
79
The task of diagnosing errors due to changes in the database structure is eased by:

A)formal policies for requesting changes.
B)database structure change documentation.
C)rollback analysis.
D)configuration control.
E)None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
80
When a transaction rereads data that has been changed and finds changes due to committed transactions,this is known as a ________.

A)Clean read
B)Dirty read
C)Nonrepeatable read
D)Phantom read
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 102 في هذه المجموعة.