978-0134601533 Chapter 6

subject Type Homework Help
subject Pages 13
subject Words 4198
subject Authors David Auer, David M. Kroenke, Scott L. Vandenberg

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Database Concepts, 8e (Kroenke)
Chapter 6 Database Administration
1) Additional DBA responsibilities do not include ________.
A) problem and error reporting
B) requests of changes to existing systems
C) controlling database configuration
D) maintaining appropriate documentation
E) editing E-R diagrams
2) The simplest and most feasible means of recovering a database is through reprocessing.
3) In comparison to reprocessing, rollforward does not involve the application programs.
4) Which of the following is not true of database recovery through reprocessing?
A) Reprocessing makes use of a database save.
B) Reprocessing takes the same amount of time as did processing in the first place.
C) Reprocessing will always return the database to its exact previous state.
D) Reprocessing requires a record of all transactions since the last time the database was saved.
E) Processing cannot be resumed at a precise point.
page-pf2
5) A point of synchronization between the database and the transaction log is called a(n)
________.
A) before-image
B) after-image
C) recovery
D) checkpoint
E) None of the above
6) Computer systems fail for which of the following reasons except?
A) Hardware breaks.
B) Electrical power fails.
C) Programs have bugs.
D) Databases randomly changed field values.
E) People make mistakes.
7) Database administrators must make sure that ________ and ________ techniques and
procedures are operating to protect the database in case of failure and to recover it as quickly and
accurately as possible when necessary.
8) Transaction results are kept in a(n) ________, which contains records of the data changes in
chronological order.
page-pf3
9) The recovery method where the database is restored using the saved data, and all transactions
since the save are reapplied is called ________ recovery.
10) The recovery method in which we undo the changes that erroneous or partially processed
transactions have made in the database is called ________ recovery.
11) Distinguish between reprocessing and rollforward as database recovery techniques.
12) An ACID transaction is one that is all but ________.
A) atomic
B) consistent
C) isolated
D) durable
E) guaranteed
page-pf4
13) Ensuring that each SQL statement independently processes consistent rows is known as
________.
A) transaction level consistency
B) independent consistency
C) statement level consistency
D) process level consistency
E) serializable consistency
14) All actions in an atomic transaction are completed successfully or none of the actions are
completed at all.
15) A transaction in which all steps must be completed successfully or none of them will be
completed is called a durable transaction.
16) Concurrent processing of a database only poses problems when two or more processes
attempt to use the same data.
page-pf5
17) A dirty read is a problem with concurrent processing when a transaction rereads data it has
already read and finds modifications or deletions caused by another transaction.
18) Statement level consistency means that all statements within a transaction will access
consistent rows across the lifetime of the entire transaction.
19) Generally, the more restrictive the transaction isolation level, the less the throughput of
database processing.
20) What concurrent processing problem occurs when a transaction rereads data and finds new
rows that were inserted by a different transaction since the prior read?
A) Nonrepeatable reads
B) Phantom reads
C) Dirty reads
D) Serialized reads
E) Unlocked reads
page-pf6
21) What concurrent processing problem occurs when a transaction reads a changed record that
has not been committed to the database?
A) Nonrepeatable reads
B) Phantom reads
C) Dirty reads
D) Serialized reads
E) Unlocked reads
22) Explain the concept of an "atomic transaction."
23) Distinguish between statement-level consistency and transaction-level consistency.
24) Which is not a typical processing application for a database?
A) Stored Procedures in PHP
B) Web forms
C) Disk Defragmenter
D) User-defined triggers
E) SQL/Persistent Stored Modules
page-pf7
25) Which of the following is not a means of processing databases?
A) Internet applications using ASP
B) Internet applications using JSP
C) Applications invoking stored procedures
D) Programs coded in C#
E) Table Normalization
26) One advantage of optimistic locking is that the lock is obtained only after the transaction is
processed.
27) Which type of lock assumes that no conflicts will occur?
A) Optimistic locks
B) Granular locks
C) Explicit locks
D) Shared locks
E) Open locks
28) Explain the process of using optimistic locking.
page-pf8
29) What is the least restrictive isolation level that will prevent phantom read problems?
A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read
30) What is the least restrictive isolation level that will prevent dirty reads?
A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read
31) What is the least restrictive isolation level that will prevent nonrepeatable reads?
A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read
32) Standard SQL defines four ________, which specify which of the concurrency control
problems are allowed to occur.
page-pf9
33) What are the four transaction isolation levels?
34) Rollback requires the use of logs, but rollforward does not.
35) Transactions should be written to the log before they are applied to the database itself.
36) The recovery technique in which the database is returned to a known state and then all valid
transactions are reapplied to the database is known as ________.
A) reprocessing
B) rollback
C) transaction logging
D) rollforward
E) checkpointing
37) Breaking hardware, power outages, and human mistakes are all reasons that ________.
page-pfa
38) Only large database systems have a need for database administration.
39) The acronym DBA refers to either the office or the manager.
40) With optimistic locking, locks are first issued, then the transaction is processed, and then the
locks are released.
41) Microsoft Access 2016 uses a user-level security system.
42) Microsoft Access 2016 databases can be secured using trusted locations for database storage.
43) Microsoft Access 2016 databases cannot be secured by password encryption.
page-pfb
44) Microsoft Access 2016 databases can be secured by deploying databases packaged with
digital signatures.
45) When Microsoft Access 2016 uses user-level security with an Access 2003 file, the database
is stored in a(n) *.accdb file.
46) The term DBA refers to the ________.
A) database accessor
B) database auditor
C) data business auditor
D) database administrator
E) data business administrator
47) When Microsoft Access 2013 secures a database just by storing the database in a trusted
location, the database file will be a(n) ________.
A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
page-pfc
48) When Microsoft Access 2016 secures a database with just a password, the database file will
be a(n) ________.
A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
49) When Microsoft Access 2016 compiles VBA code in a database, the database file will be
a(n) ________.
A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
50) When Microsoft Access 2016 creates a signed package with a digital signature, the database
file will be a(n) ________.
A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
page-pfd
51) When Microsoft Access 2016 uses user-level security with an Access 2003 file, the database
is stored in a(n) ________.
A) *.accdb file
B) *.accdc file
C) *.accde file
D) *.mdb file
E) *.mdw file
52) ________ is an important business function whose purpose is to manage the database to
maximize its value to the organization.
53) Database administrators must make sure that ________ measures are in place and enforced
so that only authorized users can take authorized actions at appropriate times.
54) Microsoft Access 2016 can secure database files by storing them in a(n) ________.
55) Microsoft Access 2016 can secure databases by using ________ to encrypt and decrypt the
database files.
page-pfe
56) Microsoft Access 2016 can secure databases by deploying databases packaged with a(n)
________.
57) When Microsoft Access 2016 compiles VBA code in a database, the resulting file is stored
using a(n) ________ file extension.
58) When Microsoft Access 2016 uses user-level security with an Access 2003 database file, it
stores the database in a(n) ________ file.
59) What database administration functions help bring order to the potential chaos of the
database processing environment?
60) Why do computers fail?
page-pff
61) Discuss Microsoft Access 2016 security administration.
62) The purpose of concurrency control is to ensure that one user's work does not inappropriately
influence another user's work.
63) The purpose of concurrency control is to ________.
A) ensure that each form has a corresponding report
B) ensure that ASPs do not duplicate JSPs
C) ensure that one user's work does not interfere with another's
D) ensure that stored procedures do not invoke triggers
E) ensure that triggers do not invoke stored procedures
64) When a transaction functions in such a way that either all of the transaction actions are
completed or none of them will be, the transaction is said to be ________.
A) consistent
B) isolated
C) atomic
D) locked
E) logical
page-pf10
65) One of the major tasks of the database administration is called ________ control, which
allows multiple users to access the database simultaneously.
66) A(n) ________ cursor takes a snapshot of a relation and processes that snapshot, while
changes from others sources are not visible to this type of cursor.
67) Database security is easy to achieve since all security is handled by the DBMS, which is a
single point of entry into the database.
68) In terms of database security, a user can be assigned many roles, and a role can be assigned
to many users.
69) What is the difference between authentication and authorization?
page-pf11
70) One way to prevent concurrent processing problems is to lock data that are retrieved for
update.
71) Lock granularity refers to whether a lock is placed by the DBMS automatically or is placed
by a command from the application program.
72) Two-phase locking can be used to ensure that transactions are serializable.
73) Preventing multiple applications from obtaining copies of the same record when the record is
about to be changed is called ________.
A) serialized reading
B) lost updating
C) concurrent processing
D) resource locking
E) block factoring
page-pf12
74) Whether a lock applies to data at the record level, page level, table level, or database level is
referred to as ________.
A) lock exclusivity
B) lock sharing
C) lock phasing
D) serializable locking
E) lock granularity
75) Which of the following is true about a shared lock?
A) It is more restrictive than an implicit lock.
B) It allows only two transactions to update a record simultaneously.
C) It locks the item from all access.
D) It allows reads to the locked item.
E) It must use a two-phase locking scheme.
76) Serializable transactions are created by having a(n) ________ phase, in which locks are
obtained, and a(n) ________ phase, in which locks are released.
77) Briefly explain the strategy of two-phased locking.
page-pf13
78) Briefly define the three problems that can occur because of concurrent processing that are
addressed by resource locking.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.