Deck 7: Database Management Systems Processes and Services

ملء الشاشة (f)
exit full mode
سؤال
What type of database update occurs when multiple users make updates to the same database at the same time?

A) batch
B) random
C) sequential
D) concurrent
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In Microsoft Access, you can identify all the objects that depend on a particular query, as well as all the objects that the query depends on.
سؤال
Some enterprise-level systems refer to the catalog as the _____.

A) data dictionary
B) journal
C) data log
D) before image
سؤال
In an enterprise-level DBMS, each task that a user completes, such as selecting a product for an order, is called a _____.

A) snapshot
B) replica
C) transaction
D) branch
سؤال
Database security can be defined as prevention of changes to the structure of a database.
سؤال
The acronym CRUD stands for _____.

A) commit, recover, undo, and decrypt
B) catalog, report, user, data
C) create, read, update, and delete
D) credentials, read-only, unique, double
سؤال
In a database catalog, _____ includes information about table relationships, views, indexes, and properties.

A) an after image
B) metadata
C) authentication
D) a transaction
سؤال
Which of the following Access tools shows the database schema?

A) system catalog
B) Navigation pane
C) Relationship report
D) Object Dependencies pane
سؤال
Microsoft Access allows concurrent updates to different records of the same table.
سؤال
How does Access handle concurrent updates?

A) with file-level locking
B) with record-level locking
C) restricting the database to one user at a time
D) through timestamping
سؤال
Many database management systems maintain catalogs of information as special, hidden tables.
سؤال
_____ occurs when multiple users make updates to the same database at the same time.

A) Data recovery
B) Atomicity
C) Concurrent update
D) Rollback
سؤال
Which of the following is information that Access system catalogs do not maintain?

A) tables and fields included in the database
B) properties of the relationships between tables
C) indexed fields
D) users, user groups, and privileges
سؤال
Which of the following is a database-as-a-service product?

A) Apache Database Service
B) SQL Server
C) Amazon Relational Database Service
D) Oracle
سؤال
_____ is the process of returning a database that has encountered a problem to a state known to be correct.

A) Committing
B) Recovery
C) Cataloging
D) Isolating
سؤال
A(n) _____ contains software components that are well documented and have a proven track record of working well together.

A) solution stack
B) web app
C) enterprise-level system
D) HTTP method
سؤال
One of the key services of a DBMS is to analyze overall hard drive usage.
سؤال
Which of the following is not a common service provided by a database management system?

A) Update and retrieve data.
B) Provide catalog services.
C) Recover data.
D) Format user views, forms, and reports.
سؤال
_____ are actions that are performed on resources or files at the server.

A) HTTP methods
B) SQL keywords
C) Solution stacks
D) SQL scripts
سؤال
Which of the following is information that the Access Database Documenter does not provide?

A) all objects in the database
B) relationships between tables
C) fields in each table
D) data in each field
سؤال
What do key integrity constraints consist of?

A) smart card limitations
B) primary key and alternate key constraints
C) primary key and foreign key constraints
D) authorization permissions
سؤال
Which of the following is an authentication tool in which information used to identify a user is stored on a physical card?

A) biometrics
B) sign-in
C) smart card
D) password
سؤال
Which Access feature restricts a field to a special format for entering data?

A) Validation Text property
B) Input Mask
C) Object Dependencies
D) Lookup properties
سؤال
Which of the following does a DBMS log typically not include for each transaction?

A) user responsible for the transaction
B) before image
C) after image
D) transaction ID
سؤال
To support data independence, you should _____ in an SQL SELECT command.

A) use the * (asterisk) wildcard to represent all fields
B) avoid using more than five fields
C) explicitly list all the required fields
D) only list fields from a single table
سؤال
Which authentication tool identifies users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics?

A) smart cards
B) data dictionaries
C) authorization
D) biometrics
سؤال
If you want to constrain a Bonus field to the values 250, 500, and 750, what type of constraint should you apply?

A) legal values
B) fieldname
C) expression
D) integrity
سؤال
Which Microsoft Access feature do you use to set legal value constraints?

A) Format
B) Data Macros
C) data type assignment
D) Validation Text property
سؤال
When you run a recovery program that applies the after images of committed transactions from the log to bring a database up to date, what method of recovery are you using?

A) after recovery
B) forward recovery
C) backward recovery
D) rollback
سؤال
What technique is used to identify the person who is attempting to access the DBMS?

A) encryption
B) authentication
C) synchronization
D) viewing
سؤال
Which of the following is not a common security feature used by database management systems?

A) encryption
B) backward recovery
C) authentication
D) authorization
سؤال
What type of rules specify user privileges to select, insert, update, and delete data for different tables and views?

A) encryption
B) authentication
C) authorization
D) privacy
سؤال
For which of the following tasks is data independence not a consideration?

A) changing a field property
B) modifying relationships
C) adding a new field
D) updating a record
سؤال
What Access tool can you use to find and fix corrupt data within a database?

A) Database Documenter
B) Validation properties
C) Compact and Repair
D) Back Up Database
سؤال
Which concept of a DBMS means that you change the database structure without requiring you to change the programs that access the database?

A) field independence
B) data independence
C) data integrity constraints
D) key integrity constraints
سؤال
Which of the following features does an enterprise-level DBMS use to avoid the costly and time-consuming task of having users redo their work?

A) encryption
B) record-level locking
C) phantom reads
D) journaling
سؤال
Which type of data integrity constraint states that the value entered for any field should be consistent with the data type for that field?

A) data type
B) legal value
C) format
D) secondary
سؤال
Which Microsoft Access tool helps you identify all objects dependent on a particular table, query, form, or report?

A) Object Dependencies
B) Relationship report
C) Navigation pane
D) Database Dependencies
سؤال
What type of constraints help to ensure the accuracy and consistency of field values?

A) key integrity constraints
B) security constraints
C) referential constraints
D) data integrity constraints
سؤال
In Microsoft Access, what do you need to decrypt an encrypted database?

A) 128-bit decryption software
B) a password
C) an administrator account
D) backup software
سؤال
Identify the type of change that generally requires the most rework to existing programs and queries in a database and explain whether making the change is worthwhile.
سؤال
Which of the following demonstrates the concept of a distributed database?

A) ACID
B) Git
C) CRUD
D) LAMP
سؤال
What type of database replication relies on centralized control that determines when replicas may be created and how they are synchronized with the master copy?

A) traditional database replication
B) distributed database model
C) local database model
D) enterprise replication
سؤال
Explain how privacy and security are related and give two examples of federal requirements for keeping data private.
سؤال
Compare techniques for handling concurrent updates in Access and those in larger database management systems on the web.
سؤال
What do you call applying and reconciling updates from various copies of a database with the master copy?

A) synchronization
B) replication
C) atomicity
D) authentication
سؤال
_____ is a popular website for hosting projects that use the Git language for version control.

A) WINS
B) Amazon Relational Database Service
C) BitBucket
D) HTTP
سؤال
_____ means that a copy of a database is distributed to other computers or locations.

A) Data independence
B) Database replication
C) Database integrity
D) Data recovery
سؤال
Describe the legal values constraint and how to apply it to best serve database users, including an example to support your answer.
سؤال
Compare traditional database replication with distributed databases.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Database Management Systems Processes and Services
1
What type of database update occurs when multiple users make updates to the same database at the same time?

A) batch
B) random
C) sequential
D) concurrent
D
2
In Microsoft Access, you can identify all the objects that depend on a particular query, as well as all the objects that the query depends on.
True
3
Some enterprise-level systems refer to the catalog as the _____.

A) data dictionary
B) journal
C) data log
D) before image
A
4
In an enterprise-level DBMS, each task that a user completes, such as selecting a product for an order, is called a _____.

A) snapshot
B) replica
C) transaction
D) branch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Database security can be defined as prevention of changes to the structure of a database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
The acronym CRUD stands for _____.

A) commit, recover, undo, and decrypt
B) catalog, report, user, data
C) create, read, update, and delete
D) credentials, read-only, unique, double
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
In a database catalog, _____ includes information about table relationships, views, indexes, and properties.

A) an after image
B) metadata
C) authentication
D) a transaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following Access tools shows the database schema?

A) system catalog
B) Navigation pane
C) Relationship report
D) Object Dependencies pane
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Microsoft Access allows concurrent updates to different records of the same table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
How does Access handle concurrent updates?

A) with file-level locking
B) with record-level locking
C) restricting the database to one user at a time
D) through timestamping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Many database management systems maintain catalogs of information as special, hidden tables.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
_____ occurs when multiple users make updates to the same database at the same time.

A) Data recovery
B) Atomicity
C) Concurrent update
D) Rollback
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is information that Access system catalogs do not maintain?

A) tables and fields included in the database
B) properties of the relationships between tables
C) indexed fields
D) users, user groups, and privileges
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is a database-as-a-service product?

A) Apache Database Service
B) SQL Server
C) Amazon Relational Database Service
D) Oracle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
_____ is the process of returning a database that has encountered a problem to a state known to be correct.

A) Committing
B) Recovery
C) Cataloging
D) Isolating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
A(n) _____ contains software components that are well documented and have a proven track record of working well together.

A) solution stack
B) web app
C) enterprise-level system
D) HTTP method
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
One of the key services of a DBMS is to analyze overall hard drive usage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is not a common service provided by a database management system?

A) Update and retrieve data.
B) Provide catalog services.
C) Recover data.
D) Format user views, forms, and reports.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
_____ are actions that are performed on resources or files at the server.

A) HTTP methods
B) SQL keywords
C) Solution stacks
D) SQL scripts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is information that the Access Database Documenter does not provide?

A) all objects in the database
B) relationships between tables
C) fields in each table
D) data in each field
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
What do key integrity constraints consist of?

A) smart card limitations
B) primary key and alternate key constraints
C) primary key and foreign key constraints
D) authorization permissions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is an authentication tool in which information used to identify a user is stored on a physical card?

A) biometrics
B) sign-in
C) smart card
D) password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which Access feature restricts a field to a special format for entering data?

A) Validation Text property
B) Input Mask
C) Object Dependencies
D) Lookup properties
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following does a DBMS log typically not include for each transaction?

A) user responsible for the transaction
B) before image
C) after image
D) transaction ID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
To support data independence, you should _____ in an SQL SELECT command.

A) use the * (asterisk) wildcard to represent all fields
B) avoid using more than five fields
C) explicitly list all the required fields
D) only list fields from a single table
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which authentication tool identifies users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics?

A) smart cards
B) data dictionaries
C) authorization
D) biometrics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
If you want to constrain a Bonus field to the values 250, 500, and 750, what type of constraint should you apply?

A) legal values
B) fieldname
C) expression
D) integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which Microsoft Access feature do you use to set legal value constraints?

A) Format
B) Data Macros
C) data type assignment
D) Validation Text property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
When you run a recovery program that applies the after images of committed transactions from the log to bring a database up to date, what method of recovery are you using?

A) after recovery
B) forward recovery
C) backward recovery
D) rollback
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
What technique is used to identify the person who is attempting to access the DBMS?

A) encryption
B) authentication
C) synchronization
D) viewing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is not a common security feature used by database management systems?

A) encryption
B) backward recovery
C) authentication
D) authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What type of rules specify user privileges to select, insert, update, and delete data for different tables and views?

A) encryption
B) authentication
C) authorization
D) privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
For which of the following tasks is data independence not a consideration?

A) changing a field property
B) modifying relationships
C) adding a new field
D) updating a record
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
What Access tool can you use to find and fix corrupt data within a database?

A) Database Documenter
B) Validation properties
C) Compact and Repair
D) Back Up Database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which concept of a DBMS means that you change the database structure without requiring you to change the programs that access the database?

A) field independence
B) data independence
C) data integrity constraints
D) key integrity constraints
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following features does an enterprise-level DBMS use to avoid the costly and time-consuming task of having users redo their work?

A) encryption
B) record-level locking
C) phantom reads
D) journaling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which type of data integrity constraint states that the value entered for any field should be consistent with the data type for that field?

A) data type
B) legal value
C) format
D) secondary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which Microsoft Access tool helps you identify all objects dependent on a particular table, query, form, or report?

A) Object Dependencies
B) Relationship report
C) Navigation pane
D) Database Dependencies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
What type of constraints help to ensure the accuracy and consistency of field values?

A) key integrity constraints
B) security constraints
C) referential constraints
D) data integrity constraints
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
In Microsoft Access, what do you need to decrypt an encrypted database?

A) 128-bit decryption software
B) a password
C) an administrator account
D) backup software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Identify the type of change that generally requires the most rework to existing programs and queries in a database and explain whether making the change is worthwhile.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following demonstrates the concept of a distributed database?

A) ACID
B) Git
C) CRUD
D) LAMP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What type of database replication relies on centralized control that determines when replicas may be created and how they are synchronized with the master copy?

A) traditional database replication
B) distributed database model
C) local database model
D) enterprise replication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Explain how privacy and security are related and give two examples of federal requirements for keeping data private.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Compare techniques for handling concurrent updates in Access and those in larger database management systems on the web.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What do you call applying and reconciling updates from various copies of a database with the master copy?

A) synchronization
B) replication
C) atomicity
D) authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
_____ is a popular website for hosting projects that use the Git language for version control.

A) WINS
B) Amazon Relational Database Service
C) BitBucket
D) HTTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
_____ means that a copy of a database is distributed to other computers or locations.

A) Data independence
B) Database replication
C) Database integrity
D) Data recovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Describe the legal values constraint and how to apply it to best serve database users, including an example to support your answer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Compare traditional database replication with distributed databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.