Computer Science Chapter 7 The successful completion of a transaction is known as an after

subject Type Homework Help
subject Pages 9
subject Words 1488
subject Authors Mary Z. Last, Philip J. Pratt

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 7: DBMS Functions
True / False
1. In some database systems, such as Microsoft Access, users can access and update metadata about fields, tables,
relationships, and indexes.
a.
True
b.
False
2. PC-based DBMSs offer a data dictionary.
a.
True
b.
False
3. The DBMS must successfully complete all transaction steps or none at all for the database to remain in a
correct state.
a.
True
b.
False
4. In two-phase locking, the second phase is the shrinking phase.
a.
True
b.
False
5. Each job that a user completes, such as filling an order, is called a user task.
a.
True
b.
False
6. When the DBMS locks more rows and releases none of the locks, this is called an expanding phase.
a.
True
b.
False
page-pf2
Chapter 7: DBMS Functions
7. In a PC-based DBMS, as long as one program has a row or table locked, no other program may access that
row or table.
a.
True
b.
False
8. One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update
transaction must lock more than one row in the same table, the whole table must be locked.
a.
True
b.
False
9. Additional storage and memory space are not required to store timestamp values.
a.
True
b.
False
10. The successful completion of a transaction is known as an after image.
a.
True
b.
False
11. The more important it is to avoid redoing work, the more often you should make backups.
a.
True
b.
False
12. A DBMS must provide ways to ensure that only authorized users can access the database.
a.
True
b.
False
13. The most common security features used by DBMSs are batch processing, journaling, and timestamping.
page-pf3
Chapter 7: DBMS Functions
a.
True
b.
False
14. Smart cards have built-in circuits containing processing logic to identify the cardholder.
a.
True
b.
False
15. Encrypted data can be read by a word processor program.
a.
True
b.
False
16. Data about the data in a database is known as ____.
a.
backup
b.
hyperdata
c.
metadata
d.
rollback
17. ____ contain information about table relationships, views, indexes, users, privileges, and replicated data.
a.
Biometrics
b.
Catalogs
c.
Workgroups
d.
Journals
18. The catalog is maintained by ____.
a.
the user
b.
the database administrator
c.
the author of the tables in the database
d.
the DBMS
page-pf4
Chapter 7: DBMS Functions
19. ____ denies access by other users to data while the DBMS processes one user's updates to the database.
a.
Batch processing
b.
Biometrics
c.
Journaling
d.
Locking
20. In order to accomplish serial processing of updates, many DBMSs use ____.
a.
backups
b.
locking
c.
encryption
d.
biometrics
21. If two or more users are waiting for the other user to release a lock before they can proceed, this is known as a ____.
a.
commit
b.
timestamp
c.
deadlock
d.
transaction
22. After a DBMS detects a deadlock, the ____ should break the deadlock.
a.
first user
b.
second user
c.
database administrator
d.
DBMS
23. To break a deadlock, the DBMS chooses one deadlocked user to be the ____.
a.
log
b.
victim
c.
workgroup
d.
backup
page-pf5
Chapter 7: DBMS Functions
24. ____ is the process of returning the database to a state that is known to be correct from a state known to be incorrect.
a.
Recovery
b.
Concurrent update
c.
Encryption
d.
Batch processing
25. The DBMS accomplishes ____ by reading the log for the problem transactions and applying the before images to
undo their updates.
a.
concurrent update
b.
backward recovery
c.
authentication
d.
batch processing
26. ____ a database reverses encryption.
a.
Locking
b.
Decrypting
c.
Synchronizing
d.
Timestamping
27. The technique for identifying the person who is attempting to access the DBMS is known as ____.
a.
encryption
b.
authentication
c.
authorization
d.
viewing
28. A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a
____.
a.
DBMS name
b.
DBA right
page-pf6
Chapter 7: DBMS Functions
c.
password
d.
table name
29. ____ identify users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial
characteristics.
a.
Passwords
b.
Data dictionaries
c.
Econometrics
d.
Biometrics
30. ____ rules specify which users have what type of access to which data in the database.
a.
Encryption
b.
Authentication
c.
Authorization
d.
View
31. The DBA usually creates groups of users called ____.
a.
networks
b.
communities
c.
workgroups
d.
clusters
32. A(n) ____ is a snapshot of certain data in a database at a given moment in time.
a.
encryption
b.
authentication
c.
authorization
d.
view
33. ____ refers to the right of individuals to have certain information about them kept confidential.
a.
Legalities
page-pf7
Chapter 7: DBMS Functions
b.
Privacy
c.
Confidentiality
d.
Consumerism
34. ____ integrity implies that the value entered for any field should be consistent with the data type for that field.
a.
Data type
b.
Legal value
c.
Format
d.
Secondary
35. ____ integrity constraints help to ensure the accuracy and consistency of individual field values.
a.
Field
b.
Value
c.
Key
d.
Data
36. A(n) ____________________ is a set of steps completed by a DBMS to accomplish a single user task.
37. ____________________ involves maintaining a log of all updates in the database.
38. A backward recovery is also called a(n) ____________________.
39. ____________________ is the prevention of unauthorized access, either intentional or accidental.
page-pf8
40. A user’s ____________________ specify what kind of access the user has to objects in the database.
41. ____________________ are rules that the DBMS must be follow in order to update data accurately and
consistently.
42. ____________________ integrity constraints consist of primary key constraints and foreign key constraints.
43. ____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary
key.
44. _________________________ is a property that lets you change the database structure without requiring
you to change the programs that access the database.
45. ____________________ occurs when the DBMS exchanges all updated data between the master database and a
replica.
46. Explain how a database is updated using batch processing.
page-pf9
47. Explain how a DBMS breaks a deadlock.
48. Discuss the advantages and disadvantages of timestamping.
49. Discuss the four ways in which integrity constraints can be handled.
50. Explain the difference between a procedural language and a nonprocedural language. Give at least one
example of each type of language.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.