Deck 7: Dbms Functions
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 7: Dbms Functions
1
In two-phase locking,the second phase is the shrinking phase.
True
2
The DBMS must successfully complete all transaction steps or none at all for the database to remain in a correct state.
True
3
In a PC-based DBMS,as long as one program has a row or table locked,no other program may access that row or table.
True
4
The successful completion of a transaction is known as an after image.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
In some database systems,such as Microsoft Access,users can access and update metadata about fields,tables,relationships,and indexes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Additional storage and memory space are not required to store timestamp values.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Smart cards have built-in circuits containing processing logic to identify the cardholder.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
When the DBMS locks more rows and releases none of the locks,this is called an expanding phase.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A DBMS must provide ways to ensure that only authorized users can access the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
____ denies access by other users to data while the DBMS processes one user's updates to the database.
A) Batch processing
B) Biometrics
C) Journaling
D) Locking
A) Batch processing
B) Biometrics
C) Journaling
D) Locking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The more important it is to avoid redoing work,the more often you should make backups.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Each job that a user completes,such as filling an order,is called a user task.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The most common security features used by DBMSs are batch processing,journaling,and timestamping.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Encrypted data can be read by a word processor program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
In order to accomplish serial processing of updates,many DBMSs use ____.
A) backups
B) locking
C) encryption
D) biometrics
A) backups
B) locking
C) encryption
D) biometrics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The catalog is maintained by ____.
A) the user
B) the database administrator
C) the author of the tables in the database
D) the DBMS
A) the user
B) the database administrator
C) the author of the tables in the database
D) the DBMS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
____ contain information about table relationships,views,indexes,users,privileges,and replicated data.
A) Biometrics
B) Catalogs
C) Workgroups
D) Journals
A) Biometrics
B) Catalogs
C) Workgroups
D) Journals
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
PC-based DBMSs offer a data dictionary.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table,the whole table must be locked.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Data about the data in a database is known as ____.
A) backup
B) hyperdata
C) metadata
D) rollback
A) backup
B) hyperdata
C) metadata
D) rollback
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The DBMS accomplishes ____ by reading the log for the problem transactions and applying the before images to undo their updates.
A) concurrent update
B) backward recovery
C) authentication
D) batch processing
A) concurrent update
B) backward recovery
C) authentication
D) batch processing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
____ a database reverses encryption.
A) Locking
B) Decrypting
C) Synchronizing
D) Timestamping
A) Locking
B) Decrypting
C) Synchronizing
D) Timestamping
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a ____.
A) DBMS name
B) DBA right
C) password
D) table name
A) DBMS name
B) DBA right
C) password
D) table name
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
____ integrity constraints help to ensure the accuracy and consistency of individual field values.
A) Field
B) Value
C) Key
D) Data
A) Field
B) Value
C) Key
D) Data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
____________________ is the prevention of unauthorized access,either intentional or accidental.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
After a DBMS detects a deadlock,the ____ should break the deadlock.
A) first user
B) second user
C) database administrator
D) DBMS
A) first user
B) second user
C) database administrator
D) DBMS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
A(n)____________________ is a set of steps completed by a DBMS to accomplish a single user task.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A(n)____ is a snapshot of certain data in a database at a given moment in time.
A) encryption
B) authentication
C) authorization
D) view
A) encryption
B) authentication
C) authorization
D) view
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The technique for identifying the person who is attempting to access the DBMS is known as ____.
A) encryption
B) authentication
C) authorization
D) viewing
A) encryption
B) authentication
C) authorization
D) viewing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
____ is the process of returning the database to a state that is known to be correct from a state known to be incorrect.
A) Recovery
B) Concurrent update
C) Encryption
D) Batch processing
A) Recovery
B) Concurrent update
C) Encryption
D) Batch processing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____ integrity implies that the value entered for any field should be consistent with the data type for that field.
A) Data type
B) Legal value
C) Format
D) Secondary
A) Data type
B) Legal value
C) Format
D) Secondary
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
____ identify users by physical characteristics such as fingerprints,voiceprints,handwritten signatures,and facial characteristics.
A) Passwords
B) Data dictionaries
C) Econometrics
D) Biometrics
A) Passwords
B) Data dictionaries
C) Econometrics
D) Biometrics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
To break a deadlock,the DBMS chooses one deadlocked user to be the ____.
A) log
B) victim
C) workgroup
D) backup
A) log
B) victim
C) workgroup
D) backup
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
If two or more users are waiting for the other user to release a lock before they can proceed,this is known as a ____.
A) commit
B) timestamp
C) deadlock
D) transaction
A) commit
B) timestamp
C) deadlock
D) transaction
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
____ refers to the right of individuals to have certain information about them kept confidential.
A) Legalities
B) Privacy
C) Confidentiality
D) Consumerism
A) Legalities
B) Privacy
C) Confidentiality
D) Consumerism
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
A backward recovery is also called a(n)____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The DBA usually creates groups of users called ____.
A) networks
B) communities
C) workgroups
D) clusters
A) networks
B) communities
C) workgroups
D) clusters
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
____ rules specify which users have what type of access to which data in the database.
A) Encryption
B) Authentication
C) Authorization
D) View
A) Encryption
B) Authentication
C) Authorization
D) View
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A user's ____________________ specify what kind of access the user has to objects in the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
____________________ involves maintaining a log of all updates in the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Explain how a DBMS breaks a deadlock.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
____________________ are rules that the DBMS must be follow in order to update data accurately and consistently.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
____________________ occurs when the DBMS exchanges all updated data between the master database and a replica.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Explain the difference between a procedural language and a nonprocedural language.Give at least one example of each type of language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
_________________________ is a property that lets you change the database structure without requiring you to change the programs that access the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Discuss the four ways in which integrity constraints can be handled.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
____________________ integrity constraints consist of primary key constraints and foreign key constraints.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss the advantages and disadvantages of timestamping.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Explain how a database is updated using batch processing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck