Deck 7: Dbms Functions

Full screen (f)
exit full mode
Question
In two-phase locking,the second phase is the shrinking phase.
Use Space or
up arrow
down arrow
to flip the card.
Question
When the DBMS locks more rows and releases none of the locks,this is called an expanding phase.
Question
In some database systems,such as Microsoft Access,users can access and update metadata about fields,tables,relationships,and indexes.
Question
____ denies access by other users to data while the DBMS processes one user's updates to the database.

A)Timestamping
B)Committing
C)Journaling
D)Locking
Question
PC-based DBMSs offer both a data dictionary and a catalog.
Question
Data about the data in a database is known as ____.

A)basedata
B)hyperdata
C)metadata
D)universaldata
Question
____ contain information about table relationships,views,indexes,users,privileges,and replicated data.

A)Datalists
B)Catalogs
C)Workgroups
D)Journals
Question
The successful completion of a transaction is known as an after log image.
Question
Concentric update occurs when multiple users make updates to the same database at the same time.
Question
The more important it is to avoid redoing work,the more often you should make backups.
Question
Each user transaction requires only one lock.
Question
Additional disk and memory space are not required to store timestamp values.
Question
Smart cards have built-in circuits containing processing logic to identify the cardholder.
Question
In order to accomplish serial processing of updates,many DBMSs use ____.

A)backups
B)locking
C)encryption
D)reversing
Question
A DBMS must provide ways to ensure that only authorized users can access the database.
Question
One strategy to manage deadlocks is to let them occur and then have the DBMS detect and break any deadlock.
Question
Legal values is a type of key integrity constraint.
Question
One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table,the whole table must be locked.
Question
The catalog is maintained by ____.

A)the user
B)the database administrator
C)the author of the tables in the database
D)the DBMS
Question
The most common security features used by DBMSs are locking,journaling,and timestamping.
Question
____ is the process of returning the database to a state that is known to be correct from a state known to be incorrect.

A)Recovery
B)Replication
C)Rollback
D)Commit
Question
After a DBMS detects a deadlock,the ____ should break the deadlock.

A)first user
B)second user
C)database administrator
D)DBMS
Question
____ identify users by physical characteristics such as fingerprints,voiceprints,handwritten signatures,and facial characteristics.

A)Passwords
B)Visualizations
C)Econometrics
D)Biometrics
Question
____ integrity implies that the value entered for any field should be consistent with the data type for that field.

A)Data type
B)Legal value
C)Format
D)Secondary
Question
The DBMS accomplishes ____ by reading the log for the problem transactions and applying the before images to undo their updates.

A)concurrent update
B)backward recovery
C)authentication
D)batch processing
Question
____________________ is the prevention of unauthorized access,either intentional or accidental.
Question
____ integrity constraints help to ensure the accuracy and consistency of individual field values.

A)Field
B)Value
C)Key
D)Data
Question
A(n) ____________________ is a set of steps completed by a DBMS to accomplish a single user task.
Question
A(n) ____ is a snapshot of certain data in a database at a given moment in time.

A)encryption
B)authentication
C)authorization
D)view
Question
A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a database ____.

A)name
B)right
C)password
D)privilege
Question
The DBA usually creates groups of users called ____.

A)networks
B)communities
C)workgroups
D)clusters
Question
____ a database reverses encryption.

A)Locking
B)Decrypting
C)Synchronizing
D)Timestamping
Question
A user's ____________________ specify what kind of access the user has to objects in the database.
Question
To break a deadlock,the DBMS chooses one deadlocked user to be the ____.

A)lostlock
B)victim
C)participant
D)principal
Question
If two or more users are waiting for the other user to release a lock before they can proceed,this is known as a ____.

A)commit
B)timestamp
C)deadlock
D)transaction
Question
The technique for identifying the person who is attempting to access the DBMS is known as ____.

A)encryption
B)authentication
C)authorization
D)viewing
Question
A backward recovery is also called a(n) ____________________.
Question
____________________ involves maintaining a log of all updates to the database.
Question
____ refers to the right of individuals to have certain information about them kept confidential.

A)Legalities
B)Privacy
C)Confidentiality
D)Consumerism
Question
____ rules specify which users have what type of access to which data in the database.

A)Encryption
B)Authentication
C)Authorization
D)View
Question
____________________ are rules that the DBMS must follow in order to update data accurately and consistently.
Question
____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.
Question
Discuss the four ways in which integrity constraints can be handled.
Question
Discuss the advantages and disadvantages of timestamping.
Question
Explain the difference between a procedural language and a nonprocedural language. Give at least one example of each type of language.
Question
____________________ occurs when the DBMS exchanges all updated data between the master database and a replica.
Question
What is two-phase locking?
Question
Explain how a database is updated using batch processing.
Question
____________________ is a property that lets you change the database structure without requiring you to change the programs that access the database.
Question
____________________ integrity constraints consist of primary key constraints and foreign key constraints.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Dbms Functions
1
In two-phase locking,the second phase is the shrinking phase.
True
2
When the DBMS locks more rows and releases none of the locks,this is called an expanding phase.
False
3
In some database systems,such as Microsoft Access,users can access and update metadata about fields,tables,relationships,and indexes.
True
4
____ denies access by other users to data while the DBMS processes one user's updates to the database.

A)Timestamping
B)Committing
C)Journaling
D)Locking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
PC-based DBMSs offer both a data dictionary and a catalog.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Data about the data in a database is known as ____.

A)basedata
B)hyperdata
C)metadata
D)universaldata
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
____ contain information about table relationships,views,indexes,users,privileges,and replicated data.

A)Datalists
B)Catalogs
C)Workgroups
D)Journals
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The successful completion of a transaction is known as an after log image.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Concentric update occurs when multiple users make updates to the same database at the same time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The more important it is to avoid redoing work,the more often you should make backups.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Each user transaction requires only one lock.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Additional disk and memory space are not required to store timestamp values.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Smart cards have built-in circuits containing processing logic to identify the cardholder.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
In order to accomplish serial processing of updates,many DBMSs use ____.

A)backups
B)locking
C)encryption
D)reversing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
A DBMS must provide ways to ensure that only authorized users can access the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
One strategy to manage deadlocks is to let them occur and then have the DBMS detect and break any deadlock.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Legal values is a type of key integrity constraint.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table,the whole table must be locked.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The catalog is maintained by ____.

A)the user
B)the database administrator
C)the author of the tables in the database
D)the DBMS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The most common security features used by DBMSs are locking,journaling,and timestamping.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
____ is the process of returning the database to a state that is known to be correct from a state known to be incorrect.

A)Recovery
B)Replication
C)Rollback
D)Commit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
After a DBMS detects a deadlock,the ____ should break the deadlock.

A)first user
B)second user
C)database administrator
D)DBMS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
____ identify users by physical characteristics such as fingerprints,voiceprints,handwritten signatures,and facial characteristics.

A)Passwords
B)Visualizations
C)Econometrics
D)Biometrics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
____ integrity implies that the value entered for any field should be consistent with the data type for that field.

A)Data type
B)Legal value
C)Format
D)Secondary
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The DBMS accomplishes ____ by reading the log for the problem transactions and applying the before images to undo their updates.

A)concurrent update
B)backward recovery
C)authentication
D)batch processing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
____________________ is the prevention of unauthorized access,either intentional or accidental.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
____ integrity constraints help to ensure the accuracy and consistency of individual field values.

A)Field
B)Value
C)Key
D)Data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) ____________________ is a set of steps completed by a DBMS to accomplish a single user task.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A(n) ____ is a snapshot of certain data in a database at a given moment in time.

A)encryption
B)authentication
C)authorization
D)view
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a database ____.

A)name
B)right
C)password
D)privilege
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The DBA usually creates groups of users called ____.

A)networks
B)communities
C)workgroups
D)clusters
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
____ a database reverses encryption.

A)Locking
B)Decrypting
C)Synchronizing
D)Timestamping
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
A user's ____________________ specify what kind of access the user has to objects in the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
To break a deadlock,the DBMS chooses one deadlocked user to be the ____.

A)lostlock
B)victim
C)participant
D)principal
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
If two or more users are waiting for the other user to release a lock before they can proceed,this is known as a ____.

A)commit
B)timestamp
C)deadlock
D)transaction
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The technique for identifying the person who is attempting to access the DBMS is known as ____.

A)encryption
B)authentication
C)authorization
D)viewing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A backward recovery is also called a(n) ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
____________________ involves maintaining a log of all updates to the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
____ refers to the right of individuals to have certain information about them kept confidential.

A)Legalities
B)Privacy
C)Confidentiality
D)Consumerism
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
____ rules specify which users have what type of access to which data in the database.

A)Encryption
B)Authentication
C)Authorization
D)View
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
____________________ are rules that the DBMS must follow in order to update data accurately and consistently.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Discuss the four ways in which integrity constraints can be handled.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Discuss the advantages and disadvantages of timestamping.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Explain the difference between a procedural language and a nonprocedural language. Give at least one example of each type of language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
____________________ occurs when the DBMS exchanges all updated data between the master database and a replica.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is two-phase locking?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Explain how a database is updated using batch processing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
____________________ is a property that lets you change the database structure without requiring you to change the programs that access the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
____________________ integrity constraints consist of primary key constraints and foreign key constraints.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.