Deck 7: Dbms Functions

Full screen (f)
exit full mode
Question
In two-phase locking,the second phase is the shrinking phase.​
Use Space or
up arrow
down arrow
to flip the card.
Question
The DBMS must successfully complete all transaction steps or none at all for the database to remain in a correct state.​
Question
In a PC-based DBMS,as long as one program has a row or table locked,no other program may access that row or table.​
Question
The successful completion of a transaction is known as an after image.​
Question
In some database systems,such as Microsoft Access,users can access and update metadata about fields,tables,relationships,and indexes.​
Question
Additional storage and memory space are not required to store timestamp values.
Question
Smart cards have built-in circuits containing processing logic to identify the cardholder.​
Question
When the DBMS locks more rows and releases none of the locks,this is called an expanding phase.​
Question
A DBMS must provide ways to ensure that only authorized users can access the database.
Question
____ denies access by other users to data while the DBMS processes one user's updates to the database.​

A) Batch processing​
B) ​Biometrics
C) ​Journaling
D) ​Locking
Question
The more important it is to avoid redoing work,the more often you should make backups.​
Question
Each job that a user completes,such as filling an order,is called a user task.
Question
The most common security features used by DBMSs are batch processing,journaling,and timestamping.
Question
Encrypted data can be read by a word processor program.​
Question
​In order to accomplish serial processing of updates,many DBMSs use ____.

A) ​backups
B) ​locking
C) ​encryption
D) ​biometrics
Question
The catalog is maintained by ____.​

A) ​the user
B) ​the database administrator
C) ​the author of the tables in the database
D) ​the DBMS
Question
____ contain information about table relationships,views,indexes,users,privileges,and replicated data.​

A) ​Biometrics
B) ​Catalogs
C) ​Workgroups
D) ​Journals
Question
PC-based DBMSs offer a data dictionary.​
Question
One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table,the whole table must be locked.​
Question
Data about the data in a database is known as ____.​

A) ​backup
B) ​hyperdata
C) ​metadata
D) ​rollback
Question
The DBMS accomplishes ____ by reading the log for the problem transactions and applying the before images to undo their updates.​

A) ​concurrent update
B) ​backward recovery
C) ​authentication
D) ​batch processing
Question
____ a database reverses encryption.​

A) ​Locking
B) ​Decrypting
C) ​Synchronizing
D) ​Timestamping
Question
A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a ____.​

A) ​DBMS name
B) ​DBA right
C) ​password
D) ​table name
Question
​____ integrity constraints help to ensure the accuracy and consistency of individual field values.

A) ​Field
B) ​Value
C) ​Key
D) ​Data
Question
​____________________ is the prevention of unauthorized access,either intentional or accidental.
Question
After a DBMS detects a deadlock,the ____ should break the deadlock.​

A) ​first user
B) ​second user
C) ​database administrator
D) ​DBMS
Question
A(n)____________________ is a set of steps completed by a DBMS to accomplish a single user task.​
Question
A(n)____ is a snapshot of certain data in a database at a given moment in time.​

A) ​encryption
B) ​authentication
C) ​authorization
D) ​view
Question
​The technique for identifying the person who is attempting to access the DBMS is known as ____.

A) ​encryption
B) ​authentication
C) ​authorization
D) ​viewing
Question
____ is the process of returning the database to a state that is known to be correct from a state known to be incorrect.​

A) ​Recovery
B) ​Concurrent update
C) ​Encryption
D) ​Batch processing
Question
____ integrity implies that the value entered for any field should be consistent with the data type for that field.​

A) ​Data type
B) ​Legal value
C) ​Format
D) ​Secondary
Question
____ identify users by physical characteristics such as fingerprints,voiceprints,handwritten signatures,and facial characteristics.​

A) ​Passwords
B) ​Data dictionaries
C) ​Econometrics
D) ​Biometrics
Question
To break a deadlock,the DBMS chooses one deadlocked user to be the ____.​

A) ​log
B) ​victim
C) ​workgroup
D) ​backup
Question
If two or more users are waiting for the other user to release a lock before they can proceed,this is known as a ____.​

A) commit​
B) ​timestamp
C) ​deadlock
D) ​transaction
Question
____ refers to the right of individuals to have certain information about them kept confidential.​

A) ​Legalities
B) ​Privacy
C) ​Confidentiality
D) ​Consumerism
Question
​A backward recovery is also called a(n)____________________.
Question
The DBA usually creates groups of users called ____.​

A) ​networks
B) ​communities
C) ​workgroups
D) ​clusters
Question
____ rules specify which users have what type of access to which data in the database.​

A) ​Encryption
B) ​Authentication
C) ​Authorization
D) ​View
Question
A user's ____________________ specify what kind of access the user has to objects in the database.​
Question
____________________ involves maintaining a log of all updates in the database.​
Question
Explain how a DBMS breaks a deadlock.​
Question
____________________ are rules that the DBMS must be follow in order to update data accurately and consistently.​
Question
​____________________ occurs when the DBMS exchanges all updated data between the master database and a replica.
Question
Explain the difference between a procedural language and a nonprocedural language.Give at least one example of each type of language.​
Question
​____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.
Question
_________________________ is a property that lets you change the database structure without requiring you to change the programs that access the database.​
Question
Discuss the four ways in which integrity constraints can be handled.​
Question
____________________ integrity constraints consist of primary key constraints and foreign key constraints.​
Question
Discuss the advantages and disadvantages of timestamping.​
Question
Explain how a database is updated using batch processing.​
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Dbms Functions
1
In two-phase locking,the second phase is the shrinking phase.​
True
2
The DBMS must successfully complete all transaction steps or none at all for the database to remain in a correct state.​
True
3
In a PC-based DBMS,as long as one program has a row or table locked,no other program may access that row or table.​
True
4
The successful completion of a transaction is known as an after image.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
In some database systems,such as Microsoft Access,users can access and update metadata about fields,tables,relationships,and indexes.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Additional storage and memory space are not required to store timestamp values.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Smart cards have built-in circuits containing processing logic to identify the cardholder.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
When the DBMS locks more rows and releases none of the locks,this is called an expanding phase.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A DBMS must provide ways to ensure that only authorized users can access the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
____ denies access by other users to data while the DBMS processes one user's updates to the database.​

A) Batch processing​
B) ​Biometrics
C) ​Journaling
D) ​Locking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The more important it is to avoid redoing work,the more often you should make backups.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Each job that a user completes,such as filling an order,is called a user task.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The most common security features used by DBMSs are batch processing,journaling,and timestamping.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Encrypted data can be read by a word processor program.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
​In order to accomplish serial processing of updates,many DBMSs use ____.

A) ​backups
B) ​locking
C) ​encryption
D) ​biometrics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The catalog is maintained by ____.​

A) ​the user
B) ​the database administrator
C) ​the author of the tables in the database
D) ​the DBMS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
____ contain information about table relationships,views,indexes,users,privileges,and replicated data.​

A) ​Biometrics
B) ​Catalogs
C) ​Workgroups
D) ​Journals
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
PC-based DBMSs offer a data dictionary.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table,the whole table must be locked.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Data about the data in a database is known as ____.​

A) ​backup
B) ​hyperdata
C) ​metadata
D) ​rollback
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The DBMS accomplishes ____ by reading the log for the problem transactions and applying the before images to undo their updates.​

A) ​concurrent update
B) ​backward recovery
C) ​authentication
D) ​batch processing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
____ a database reverses encryption.​

A) ​Locking
B) ​Decrypting
C) ​Synchronizing
D) ​Timestamping
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a ____.​

A) ​DBMS name
B) ​DBA right
C) ​password
D) ​table name
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
​____ integrity constraints help to ensure the accuracy and consistency of individual field values.

A) ​Field
B) ​Value
C) ​Key
D) ​Data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
​____________________ is the prevention of unauthorized access,either intentional or accidental.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
After a DBMS detects a deadlock,the ____ should break the deadlock.​

A) ​first user
B) ​second user
C) ​database administrator
D) ​DBMS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
A(n)____________________ is a set of steps completed by a DBMS to accomplish a single user task.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A(n)____ is a snapshot of certain data in a database at a given moment in time.​

A) ​encryption
B) ​authentication
C) ​authorization
D) ​view
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
​The technique for identifying the person who is attempting to access the DBMS is known as ____.

A) ​encryption
B) ​authentication
C) ​authorization
D) ​viewing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
____ is the process of returning the database to a state that is known to be correct from a state known to be incorrect.​

A) ​Recovery
B) ​Concurrent update
C) ​Encryption
D) ​Batch processing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____ integrity implies that the value entered for any field should be consistent with the data type for that field.​

A) ​Data type
B) ​Legal value
C) ​Format
D) ​Secondary
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
____ identify users by physical characteristics such as fingerprints,voiceprints,handwritten signatures,and facial characteristics.​

A) ​Passwords
B) ​Data dictionaries
C) ​Econometrics
D) ​Biometrics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
To break a deadlock,the DBMS chooses one deadlocked user to be the ____.​

A) ​log
B) ​victim
C) ​workgroup
D) ​backup
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
If two or more users are waiting for the other user to release a lock before they can proceed,this is known as a ____.​

A) commit​
B) ​timestamp
C) ​deadlock
D) ​transaction
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
____ refers to the right of individuals to have certain information about them kept confidential.​

A) ​Legalities
B) ​Privacy
C) ​Confidentiality
D) ​Consumerism
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
​A backward recovery is also called a(n)____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The DBA usually creates groups of users called ____.​

A) ​networks
B) ​communities
C) ​workgroups
D) ​clusters
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
____ rules specify which users have what type of access to which data in the database.​

A) ​Encryption
B) ​Authentication
C) ​Authorization
D) ​View
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A user's ____________________ specify what kind of access the user has to objects in the database.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
____________________ involves maintaining a log of all updates in the database.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Explain how a DBMS breaks a deadlock.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
____________________ are rules that the DBMS must be follow in order to update data accurately and consistently.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
​____________________ occurs when the DBMS exchanges all updated data between the master database and a replica.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Explain the difference between a procedural language and a nonprocedural language.Give at least one example of each type of language.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
​____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
_________________________ is a property that lets you change the database structure without requiring you to change the programs that access the database.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Discuss the four ways in which integrity constraints can be handled.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
____________________ integrity constraints consist of primary key constraints and foreign key constraints.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss the advantages and disadvantages of timestamping.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Explain how a database is updated using batch processing.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.