Deck 7: Dbms Functions

Full screen (f)
exit full mode
Question
What type of database update occurs when multiple users make updates to the same database at the same time?

A) batch
B) random
C) sequential
D) concurrent
Use Space or
up arrow
down arrow
to flip the card.
Question
Timestamping avoids the need to lock rows in the database and eliminates the processing time needed to apply and release locks and to detect and resolve deadlocks.
Question
Which of the following is descriptive information about the data in a database?

A) backup
B) hyperdata
C) metadata
D) rollback
Question
In updating and retrieving data, users need to know how data is physically structured on a storage medium.
Question
In order to accomplish serial processing of updates, what technique do many DBMSs use?

A) backups
B) locking
C) encryption
D) biometrics
Question
You can improve the performance of the recovery program by having it first scan the log and then apply the last after image.
Question
You can minimize the occurrence of deadlocks by making sure all programs lock records in random order whenever possible.
Question
Authentication refers to techniques for decrypting data when it accessed by authorized users.
Question
If the database has been destroyed, you can use a rollback to recover the database to a valid state by undoing problem transactions.
Question
Encryption converts the data in a database to a format that is indecipherable to unauthorized users who attempt to bypass the DBMS.
Question
When the DBMS locks more rows and releases none of the locks, this is called the contracting phase.
Question
The DBMS must successfully complete all transaction steps or none at all for the database to remain in a correct state.
Question
DBMSs must manage multiple copies of the same data at multiple locations.
Question
In two-phase locking, the second phase is where the DBMS releases all locks and acquires no new locks.
Question
When a DBMS uses journaling, the update log is part of the same file in which the database is stored.
Question
Which of the following is NOT one of the nine functions of a DBMS?

A) catalog services
B) security services
C) automatic table design
D) support data replication
Question
A commit is a record of what the data in a row looked like before an update.
Question
One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table, the whole table must be locked.
Question
Which of the following contains information about table relationships, views, indexes, users, privileges, and replicated data?

A) Biometrics
B) Catalogs
C) Workgroups
D) Journals
Question
One of the nine functions of a DBMS is to provide disk management services.
Question
What does a DBMS do to break a deadlock?

A) rolls back all transactions involved in the deadlock
B) chooses one deadlocked user to be the victim
C) closes the database and restores from the last backup
D) erases the records involved in the deadlock and reschedules the transactions
Question
Which authentication method identifies users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics?

A) smart cards
B) data dictionaries
C) authorization
D) biometrics
Question
____________________ is the prevention of unauthorized access, either intentional or accidental.
Question
____________________ involves maintaining a log of all updates in the database.
Question
A backward recovery is also called a(n) ____________________.
Question
Which process returns the database to a state that is known to be correct?

A) recovery
B) concurrent update
C) encryption
D) batch processing
Question
What occurs when two or more users are waiting for the other user to release a lock before their transaction can proceed?

A) commit
B) timestamp
C) deadlock
D) transaction
Question
What strategy can programs employ to minimize the occurrence of deadlocks?

A) Only unlock records at the end of the day.
B) Unlock records in the reverse order in which they were locked.
C) Use a random order record-locking strategy.
D) Lock records in the same order.
Question
What technique is used to identify the person who is attempting to access the DBMS?

A) encryption
B) authentication
C) authorization
D) viewing
Question
Which of the following is an authentication method in which information used to identify a user is stored on a plastic card?

A) biometrics
B) sign-in
C) smart card
D) password
Question
In which procedure does the DBMS read the log for the problem transactions and apply the before images to undo their updates?

A) concurrent update
B) backward recovery
C) authentication
D) batch processing
Question
Which type of data integrity constraint states that the value entered for any field should be consistent with the data type for that field?

A) data type
B) legal value
C) format
D) secondary
Question
What type of rules specify which users have what type of access to which data in the database?

A) encryption
B) authentication
C) authorization
D) privacy
Question
A user's ____________________ specify what kind of access the user has to objects in the database.
Question
Which of the following is a federal law that sets a national standard to protect an individual's medical records and other personal health information?

A) FCRA
B) HIPAA
C) FERPA
D) IDEA
Question
What do key integrity constraints consist of?

A) smart card limitations
B) primary and alternate key constraints
C) primary and foreign key constraints
D) authorization permissions
Question
A(n) ____________________ is a set of steps completed by a DBMS to accomplish a single user task.
Question
Which property of a DBMS lets you change the database structure without requiring you to change the programs that access the database?

A) field independence
B) data integrity constraints
C) key integrity constraints
D) data independence
Question
In Microsoft Access, what do you need to decrypt an encrypted database?

A) 128-bit decryption software
B) a password
C) an administrator account
D) backup software
Question
What can be described as a snapshot of certain data in a database at a given moment in time?

A) encryption
B) authentication
C) authorization
D) view
Question
Discuss the advantages and disadvantages of timestamping.
Question
A DBMS provides a number of ____________________ services that assist in the general maintenance of the database.
Question
____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.
Question
Explain how a DBMS breaks a deadlock.
Question
_________________________ allows users at different sites to use and modify copies of a database and then share their changes with the other users.
Question
____________________ constraints are rules that the DBMS must be follow in order to update data accurately and consistently.
Question
Discuss the four ways in which integrity constraints can be handled.
Question
Explain how a database is updated using batch processing.
Question
____________________ integrity constraints consist of primary key constraints and foreign key constraints.
Question
What is data replication? Describe how replication can lead to more efficient database processing.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Dbms Functions
1
What type of database update occurs when multiple users make updates to the same database at the same time?

A) batch
B) random
C) sequential
D) concurrent
D
2
Timestamping avoids the need to lock rows in the database and eliminates the processing time needed to apply and release locks and to detect and resolve deadlocks.
True
3
Which of the following is descriptive information about the data in a database?

A) backup
B) hyperdata
C) metadata
D) rollback
C
4
In updating and retrieving data, users need to know how data is physically structured on a storage medium.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
In order to accomplish serial processing of updates, what technique do many DBMSs use?

A) backups
B) locking
C) encryption
D) biometrics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
You can improve the performance of the recovery program by having it first scan the log and then apply the last after image.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
You can minimize the occurrence of deadlocks by making sure all programs lock records in random order whenever possible.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Authentication refers to techniques for decrypting data when it accessed by authorized users.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
If the database has been destroyed, you can use a rollback to recover the database to a valid state by undoing problem transactions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Encryption converts the data in a database to a format that is indecipherable to unauthorized users who attempt to bypass the DBMS.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
When the DBMS locks more rows and releases none of the locks, this is called the contracting phase.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The DBMS must successfully complete all transaction steps or none at all for the database to remain in a correct state.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
DBMSs must manage multiple copies of the same data at multiple locations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
In two-phase locking, the second phase is where the DBMS releases all locks and acquires no new locks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
When a DBMS uses journaling, the update log is part of the same file in which the database is stored.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is NOT one of the nine functions of a DBMS?

A) catalog services
B) security services
C) automatic table design
D) support data replication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
A commit is a record of what the data in a row looked like before an update.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table, the whole table must be locked.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following contains information about table relationships, views, indexes, users, privileges, and replicated data?

A) Biometrics
B) Catalogs
C) Workgroups
D) Journals
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
One of the nine functions of a DBMS is to provide disk management services.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What does a DBMS do to break a deadlock?

A) rolls back all transactions involved in the deadlock
B) chooses one deadlocked user to be the victim
C) closes the database and restores from the last backup
D) erases the records involved in the deadlock and reschedules the transactions
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which authentication method identifies users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics?

A) smart cards
B) data dictionaries
C) authorization
D) biometrics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
____________________ is the prevention of unauthorized access, either intentional or accidental.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
____________________ involves maintaining a log of all updates in the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A backward recovery is also called a(n) ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which process returns the database to a state that is known to be correct?

A) recovery
B) concurrent update
C) encryption
D) batch processing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What occurs when two or more users are waiting for the other user to release a lock before their transaction can proceed?

A) commit
B) timestamp
C) deadlock
D) transaction
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
What strategy can programs employ to minimize the occurrence of deadlocks?

A) Only unlock records at the end of the day.
B) Unlock records in the reverse order in which they were locked.
C) Use a random order record-locking strategy.
D) Lock records in the same order.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
What technique is used to identify the person who is attempting to access the DBMS?

A) encryption
B) authentication
C) authorization
D) viewing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is an authentication method in which information used to identify a user is stored on a plastic card?

A) biometrics
B) sign-in
C) smart card
D) password
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
In which procedure does the DBMS read the log for the problem transactions and apply the before images to undo their updates?

A) concurrent update
B) backward recovery
C) authentication
D) batch processing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Which type of data integrity constraint states that the value entered for any field should be consistent with the data type for that field?

A) data type
B) legal value
C) format
D) secondary
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What type of rules specify which users have what type of access to which data in the database?

A) encryption
B) authentication
C) authorization
D) privacy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A user's ____________________ specify what kind of access the user has to objects in the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is a federal law that sets a national standard to protect an individual's medical records and other personal health information?

A) FCRA
B) HIPAA
C) FERPA
D) IDEA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
What do key integrity constraints consist of?

A) smart card limitations
B) primary and alternate key constraints
C) primary and foreign key constraints
D) authorization permissions
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) ____________________ is a set of steps completed by a DBMS to accomplish a single user task.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Which property of a DBMS lets you change the database structure without requiring you to change the programs that access the database?

A) field independence
B) data integrity constraints
C) key integrity constraints
D) data independence
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
In Microsoft Access, what do you need to decrypt an encrypted database?

A) 128-bit decryption software
B) a password
C) an administrator account
D) backup software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What can be described as a snapshot of certain data in a database at a given moment in time?

A) encryption
B) authentication
C) authorization
D) view
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss the advantages and disadvantages of timestamping.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
A DBMS provides a number of ____________________ services that assist in the general maintenance of the database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Explain how a DBMS breaks a deadlock.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
_________________________ allows users at different sites to use and modify copies of a database and then share their changes with the other users.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
____________________ constraints are rules that the DBMS must be follow in order to update data accurately and consistently.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Discuss the four ways in which integrity constraints can be handled.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Explain how a database is updated using batch processing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
____________________ integrity constraints consist of primary key constraints and foreign key constraints.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is data replication? Describe how replication can lead to more efficient database processing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.