Deck 6: Database Administration

Full screen (f)
exit full mode
Question
Ensuring that each SQL statement independently processes consistent rows is known as ________.

A) transaction level consistency
B) independent consistency
C) statement level consistency
D) process level consistency
E) serializable consistency
Use Space or
up arrow
down arrow
to flip the card.
Question
A transaction in which all steps must be completed successfully or none of them will be completed is called a durable transaction.
Question
Statement level consistency means that all statements within a transaction will access consistent rows across the lifetime of the entire transaction.
Question
The recovery method in which we undo the changes that erroneous or partially processed transactions have made in the database is called ________ recovery.
Question
Concurrent processing of a database only poses problems when two or more processes attempt to use the same data.
Question
Transaction results are kept in a(n)________,which contains records of the data changes in chronological order.
Question
An ACID transaction is one that is all but ________.

A) atomic
B) consistent
C) isolated
D) durable
E) guaranteed
Question
The recovery method where the database is restored using the saved data,and all transactions since the save are reapplied is called ________ recovery.
Question
Which of the following is not true of database recovery through reprocessing?

A) Reprocessing makes use of a database save.
B) Reprocessing takes the same amount of time as did processing in the first place.
C) Reprocessing will always return the database to its exact previous state.
D) Reprocessing requires a record of all transactions since the last time the database was saved.
E) Processing cannot be resumed at a precise point.
Question
A point of synchronization between the database and the transaction log is called a(n)________.

A) before-image
B) after-image
C) recovery
D) checkpoint
E) None of the above
Question
Computer systems fail for which of the following reasons except?

A) Hardware breaks.
B) Electrical power fails.
C) Programs have bugs.
D) Databases randomly changed field values.
E) People make mistakes.
Question
What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a different transaction since the prior read?

A) Nonrepeatable reads
B) Phantom reads
C) Dirty reads
D) Serialized reads
E) Unlocked reads
Question
Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the database in case of failure and to recover it as quickly and accurately as possible when necessary.
Question
A dirty read is a problem with concurrent processing when a transaction rereads data it has already read and finds modifications or deletions caused by another transaction.
Question
Additional DBA responsibilities do not include ________.

A) problem and error reporting
B) requests of changes to existing systems
C) controlling database configuration
D) maintaining appropriate documentation
E) editing E-R diagrams
Question
Distinguish between reprocessing and rollforward as database recovery techniques.
Question
In comparison to reprocessing,rollforward does not involve the application programs.
Question
Generally,the more restrictive the transaction isolation level,the less the throughput of database processing.
Question
All actions in an atomic transaction are completed successfully or none of the actions are completed at all.
Question
The simplest and most feasible means of recovering a database is through reprocessing.
Question
Explain the concept of an "atomic transaction."
Question
The acronym DBA refers to either the office or the manager.
Question
Which type of lock assumes that no conflicts will occur?

A) Optimistic locks
B) Granular locks
C) Explicit locks
D) Shared locks
E) Open locks
Question
What are the four transaction isolation levels?
Question
What is the least restrictive isolation level that will prevent dirty reads?

A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read
Question
Distinguish between statement-level consistency and transaction-level consistency.
Question
What is the least restrictive isolation level that will prevent phantom read problems?

A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read
Question
Standard SQL defines four ________,which specify which of the concurrency control problems are allowed to occur.
Question
Only large database systems have a need for database administration.
Question
Explain the process of using optimistic locking.
Question
With optimistic locking,locks are first issued,then the transaction is processed,and then the locks are released.
Question
One advantage of optimistic locking is that the lock is obtained only after the transaction is processed.
Question
Breaking hardware,power outages,and human mistakes are all reasons that ________.
Question
Which is not a typical processing application for a database?

A) Stored Procedures in PHP
B) Web forms
C) Disk Defragmenter
D) User-defined triggers
E) SQL/Persistent Stored Modules
Question
The recovery technique in which the database is returned to a known state and then all valid transactions are reapplied to the database is known as ________.

A) reprocessing
B) rollback
C) transaction logging
D) rollforward
E) checkpointing
Question
What is the least restrictive isolation level that will prevent nonrepeatable reads?

A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read
Question
Which of the following is not a means of processing databases?

A) Internet applications using ASP
B) Internet applications using JSP
C) Applications invoking stored procedures
D) Programs coded in C#
E) Table Normalization
Question
Transactions should be written to the log before they are applied to the database itself.
Question
What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database?

A) Nonrepeatable reads
B) Phantom reads
C) Dirty reads
D) Serialized reads
E) Unlocked reads
Question
Rollback requires the use of logs,but rollforward does not.
Question
Microsoft Access 2016 uses a user-level security system.
Question
When Microsoft Access 2016 uses user-level security with an Access 2003 file,the database is stored in a(n)*.accdb file.
Question
Why do computers fail?
Question
When Microsoft Access 2016 uses user-level security with an Access 2003 database file,it stores the database in a(n)________ file.
Question
When Microsoft Access 2013 secures a database just by storing the database in a trusted location,the database file will be a(n)________.

A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
Question
Microsoft Access 2016 can secure databases by deploying databases packaged with a(n)________.
Question
Microsoft Access 2016 can secure databases by using ________ to encrypt and decrypt the database files.
Question
Microsoft Access 2016 databases can be secured by deploying databases packaged with digital signatures.
Question
What database administration functions help bring order to the potential chaos of the database processing environment?
Question
Database administrators must make sure that ________ measures are in place and enforced so that only authorized users can take authorized actions at appropriate times.
Question
Microsoft Access 2016 databases can be secured using trusted locations for database storage.
Question
Microsoft Access 2016 databases cannot be secured by password encryption.
Question
Microsoft Access 2016 can secure database files by storing them in a(n)________.
Question
________ is an important business function whose purpose is to manage the database to maximize its value to the organization.
Question
When Microsoft Access 2016 compiles VBA code in a database,the database file will be a(n)________.

A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
Question
When Microsoft Access 2016 creates a signed package with a digital signature,the database file will be a(n)________.

A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
Question
When Microsoft Access 2016 secures a database with just a password,the database file will be a(n)________.

A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
Question
When Microsoft Access 2016 uses user-level security with an Access 2003 file,the database is stored in a(n)________.

A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
Question
When Microsoft Access 2016 compiles VBA code in a database,the resulting file is stored using a(n)________ file extension.
Question
The term DBA refers to the ________.

A) database accessor
B) database auditor
C) data business auditor
D) database administrator
E) data business administrator
Question
Briefly define the three problems that can occur because of concurrent processing that are addressed by resource locking.
Question
Which of the following is true about a shared lock?

A) It is more restrictive than an implicit lock.
B) It allows only two transactions to update a record simultaneously.
C) It locks the item from all access.
D) It allows reads to the locked item.
E) It must use a two-phase locking scheme.
Question
The purpose of concurrency control is to ensure that one user's work does not inappropriately influence another user's work.
Question
Two-phase locking can be used to ensure that transactions are serializable.
Question
Briefly explain the strategy of two-phased locking.
Question
What is the difference between authentication and authorization?
Question
Database security is easy to achieve since all security is handled by the DBMS,which is a single point of entry into the database.
Question
Lock granularity refers to whether a lock is placed by the DBMS automatically or is placed by a command from the application program.
Question
In terms of database security,a user can be assigned many roles,and a role can be assigned to many users.
Question
One way to prevent concurrent processing problems is to lock data that are retrieved for update.
Question
The purpose of concurrency control is to ________.

A) ensure that each form has a corresponding report
B) ensure that ASPs do not duplicate JSPs
C) ensure that one user's work does not interfere with another's
D) ensure that stored procedures do not invoke triggers
E) ensure that triggers do not invoke stored procedures
Question
Discuss Microsoft Access 2016 security administration.
Question
One of the major tasks of the database administration is called ________ control,which allows multiple users to access the database simultaneously.
Question
Preventing multiple applications from obtaining copies of the same record when the record is about to be changed is called ________.

A) serialized reading
B) lost updating
C) concurrent processing
D) resource locking
E) block factoring
Question
Whether a lock applies to data at the record level,page level,table level,or database level is referred to as ________.

A) lock exclusivity
B) lock sharing
C) lock phasing
D) serializable locking
E) lock granularity
Question
A(n)________ cursor takes a snapshot of a relation and processes that snapshot,while changes from others sources are not visible to this type of cursor.
Question
Serializable transactions are created by having a(n)________ phase,in which locks are obtained,and a(n)________ phase,in which locks are released.
Question
When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be,the transaction is said to be ________.

A) consistent
B) isolated
C) atomic
D) locked
E) logical
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/78
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Database Administration
1
Ensuring that each SQL statement independently processes consistent rows is known as ________.

A) transaction level consistency
B) independent consistency
C) statement level consistency
D) process level consistency
E) serializable consistency
C
2
A transaction in which all steps must be completed successfully or none of them will be completed is called a durable transaction.
False
3
Statement level consistency means that all statements within a transaction will access consistent rows across the lifetime of the entire transaction.
False
4
The recovery method in which we undo the changes that erroneous or partially processed transactions have made in the database is called ________ recovery.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
5
Concurrent processing of a database only poses problems when two or more processes attempt to use the same data.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
6
Transaction results are kept in a(n)________,which contains records of the data changes in chronological order.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
7
An ACID transaction is one that is all but ________.

A) atomic
B) consistent
C) isolated
D) durable
E) guaranteed
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
8
The recovery method where the database is restored using the saved data,and all transactions since the save are reapplied is called ________ recovery.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is not true of database recovery through reprocessing?

A) Reprocessing makes use of a database save.
B) Reprocessing takes the same amount of time as did processing in the first place.
C) Reprocessing will always return the database to its exact previous state.
D) Reprocessing requires a record of all transactions since the last time the database was saved.
E) Processing cannot be resumed at a precise point.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
10
A point of synchronization between the database and the transaction log is called a(n)________.

A) before-image
B) after-image
C) recovery
D) checkpoint
E) None of the above
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
11
Computer systems fail for which of the following reasons except?

A) Hardware breaks.
B) Electrical power fails.
C) Programs have bugs.
D) Databases randomly changed field values.
E) People make mistakes.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
12
What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a different transaction since the prior read?

A) Nonrepeatable reads
B) Phantom reads
C) Dirty reads
D) Serialized reads
E) Unlocked reads
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
13
Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the database in case of failure and to recover it as quickly and accurately as possible when necessary.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
14
A dirty read is a problem with concurrent processing when a transaction rereads data it has already read and finds modifications or deletions caused by another transaction.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
15
Additional DBA responsibilities do not include ________.

A) problem and error reporting
B) requests of changes to existing systems
C) controlling database configuration
D) maintaining appropriate documentation
E) editing E-R diagrams
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
16
Distinguish between reprocessing and rollforward as database recovery techniques.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
17
In comparison to reprocessing,rollforward does not involve the application programs.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
18
Generally,the more restrictive the transaction isolation level,the less the throughput of database processing.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
19
All actions in an atomic transaction are completed successfully or none of the actions are completed at all.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
20
The simplest and most feasible means of recovering a database is through reprocessing.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
21
Explain the concept of an "atomic transaction."
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
22
The acronym DBA refers to either the office or the manager.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
23
Which type of lock assumes that no conflicts will occur?

A) Optimistic locks
B) Granular locks
C) Explicit locks
D) Shared locks
E) Open locks
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
24
What are the four transaction isolation levels?
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
25
What is the least restrictive isolation level that will prevent dirty reads?

A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
26
Distinguish between statement-level consistency and transaction-level consistency.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
27
What is the least restrictive isolation level that will prevent phantom read problems?

A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
28
Standard SQL defines four ________,which specify which of the concurrency control problems are allowed to occur.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
29
Only large database systems have a need for database administration.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
30
Explain the process of using optimistic locking.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
31
With optimistic locking,locks are first issued,then the transaction is processed,and then the locks are released.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
32
One advantage of optimistic locking is that the lock is obtained only after the transaction is processed.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
33
Breaking hardware,power outages,and human mistakes are all reasons that ________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
34
Which is not a typical processing application for a database?

A) Stored Procedures in PHP
B) Web forms
C) Disk Defragmenter
D) User-defined triggers
E) SQL/Persistent Stored Modules
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
35
The recovery technique in which the database is returned to a known state and then all valid transactions are reapplied to the database is known as ________.

A) reprocessing
B) rollback
C) transaction logging
D) rollforward
E) checkpointing
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
36
What is the least restrictive isolation level that will prevent nonrepeatable reads?

A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is not a means of processing databases?

A) Internet applications using ASP
B) Internet applications using JSP
C) Applications invoking stored procedures
D) Programs coded in C#
E) Table Normalization
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
38
Transactions should be written to the log before they are applied to the database itself.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
39
What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database?

A) Nonrepeatable reads
B) Phantom reads
C) Dirty reads
D) Serialized reads
E) Unlocked reads
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
40
Rollback requires the use of logs,but rollforward does not.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
41
Microsoft Access 2016 uses a user-level security system.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
42
When Microsoft Access 2016 uses user-level security with an Access 2003 file,the database is stored in a(n)*.accdb file.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
43
Why do computers fail?
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
44
When Microsoft Access 2016 uses user-level security with an Access 2003 database file,it stores the database in a(n)________ file.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
45
When Microsoft Access 2013 secures a database just by storing the database in a trusted location,the database file will be a(n)________.

A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
46
Microsoft Access 2016 can secure databases by deploying databases packaged with a(n)________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
47
Microsoft Access 2016 can secure databases by using ________ to encrypt and decrypt the database files.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
48
Microsoft Access 2016 databases can be secured by deploying databases packaged with digital signatures.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
49
What database administration functions help bring order to the potential chaos of the database processing environment?
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
50
Database administrators must make sure that ________ measures are in place and enforced so that only authorized users can take authorized actions at appropriate times.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
51
Microsoft Access 2016 databases can be secured using trusted locations for database storage.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
52
Microsoft Access 2016 databases cannot be secured by password encryption.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
53
Microsoft Access 2016 can secure database files by storing them in a(n)________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
54
________ is an important business function whose purpose is to manage the database to maximize its value to the organization.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
55
When Microsoft Access 2016 compiles VBA code in a database,the database file will be a(n)________.

A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
56
When Microsoft Access 2016 creates a signed package with a digital signature,the database file will be a(n)________.

A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
57
When Microsoft Access 2016 secures a database with just a password,the database file will be a(n)________.

A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
58
When Microsoft Access 2016 uses user-level security with an Access 2003 file,the database is stored in a(n)________.

A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
59
When Microsoft Access 2016 compiles VBA code in a database,the resulting file is stored using a(n)________ file extension.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
60
The term DBA refers to the ________.

A) database accessor
B) database auditor
C) data business auditor
D) database administrator
E) data business administrator
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
61
Briefly define the three problems that can occur because of concurrent processing that are addressed by resource locking.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is true about a shared lock?

A) It is more restrictive than an implicit lock.
B) It allows only two transactions to update a record simultaneously.
C) It locks the item from all access.
D) It allows reads to the locked item.
E) It must use a two-phase locking scheme.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
63
The purpose of concurrency control is to ensure that one user's work does not inappropriately influence another user's work.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
64
Two-phase locking can be used to ensure that transactions are serializable.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
65
Briefly explain the strategy of two-phased locking.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
66
What is the difference between authentication and authorization?
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
67
Database security is easy to achieve since all security is handled by the DBMS,which is a single point of entry into the database.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
68
Lock granularity refers to whether a lock is placed by the DBMS automatically or is placed by a command from the application program.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
69
In terms of database security,a user can be assigned many roles,and a role can be assigned to many users.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
70
One way to prevent concurrent processing problems is to lock data that are retrieved for update.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
71
The purpose of concurrency control is to ________.

A) ensure that each form has a corresponding report
B) ensure that ASPs do not duplicate JSPs
C) ensure that one user's work does not interfere with another's
D) ensure that stored procedures do not invoke triggers
E) ensure that triggers do not invoke stored procedures
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
72
Discuss Microsoft Access 2016 security administration.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
73
One of the major tasks of the database administration is called ________ control,which allows multiple users to access the database simultaneously.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
74
Preventing multiple applications from obtaining copies of the same record when the record is about to be changed is called ________.

A) serialized reading
B) lost updating
C) concurrent processing
D) resource locking
E) block factoring
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
75
Whether a lock applies to data at the record level,page level,table level,or database level is referred to as ________.

A) lock exclusivity
B) lock sharing
C) lock phasing
D) serializable locking
E) lock granularity
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
76
A(n)________ cursor takes a snapshot of a relation and processes that snapshot,while changes from others sources are not visible to this type of cursor.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
77
Serializable transactions are created by having a(n)________ phase,in which locks are obtained,and a(n)________ phase,in which locks are released.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
78
When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be,the transaction is said to be ________.

A) consistent
B) isolated
C) atomic
D) locked
E) logical
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 78 flashcards in this deck.