Deck 7: Database Management Systems Processes and Services
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 7: Database Management Systems Processes and Services
1
What type of database update occurs when multiple users make updates to the same database at the same time?
A) batch
B) random
C) sequential
D) concurrent
A) batch
B) random
C) sequential
D) concurrent
D
2
In Microsoft Access, you can identify all the objects that depend on a particular query, as well as all the objects that the query depends on.
True
3
Some enterprise-level systems refer to the catalog as the _____.
A) data dictionary
B) journal
C) data log
D) before image
A) data dictionary
B) journal
C) data log
D) before image
A
4
In an enterprise-level DBMS, each task that a user completes, such as selecting a product for an order, is called a _____.
A) snapshot
B) replica
C) transaction
D) branch
A) snapshot
B) replica
C) transaction
D) branch
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Database security can be defined as prevention of changes to the structure of a database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The acronym CRUD stands for _____.
A) commit, recover, undo, and decrypt
B) catalog, report, user, data
C) create, read, update, and delete
D) credentials, read-only, unique, double
A) commit, recover, undo, and decrypt
B) catalog, report, user, data
C) create, read, update, and delete
D) credentials, read-only, unique, double
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
In a database catalog, _____ includes information about table relationships, views, indexes, and properties.
A) an after image
B) metadata
C) authentication
D) a transaction
A) an after image
B) metadata
C) authentication
D) a transaction
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following Access tools shows the database schema?
A) system catalog
B) Navigation pane
C) Relationship report
D) Object Dependencies pane
A) system catalog
B) Navigation pane
C) Relationship report
D) Object Dependencies pane
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Microsoft Access allows concurrent updates to different records of the same table.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
How does Access handle concurrent updates?
A) with file-level locking
B) with record-level locking
C) restricting the database to one user at a time
D) through timestamping
A) with file-level locking
B) with record-level locking
C) restricting the database to one user at a time
D) through timestamping
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Many database management systems maintain catalogs of information as special, hidden tables.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
_____ occurs when multiple users make updates to the same database at the same time.
A) Data recovery
B) Atomicity
C) Concurrent update
D) Rollback
A) Data recovery
B) Atomicity
C) Concurrent update
D) Rollback
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is information that Access system catalogs do not maintain?
A) tables and fields included in the database
B) properties of the relationships between tables
C) indexed fields
D) users, user groups, and privileges
A) tables and fields included in the database
B) properties of the relationships between tables
C) indexed fields
D) users, user groups, and privileges
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is a database-as-a-service product?
A) Apache Database Service
B) SQL Server
C) Amazon Relational Database Service
D) Oracle
A) Apache Database Service
B) SQL Server
C) Amazon Relational Database Service
D) Oracle
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
_____ is the process of returning a database that has encountered a problem to a state known to be correct.
A) Committing
B) Recovery
C) Cataloging
D) Isolating
A) Committing
B) Recovery
C) Cataloging
D) Isolating
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) _____ contains software components that are well documented and have a proven track record of working well together.
A) solution stack
B) web app
C) enterprise-level system
D) HTTP method
A) solution stack
B) web app
C) enterprise-level system
D) HTTP method
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
One of the key services of a DBMS is to analyze overall hard drive usage.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is not a common service provided by a database management system?
A) Update and retrieve data.
B) Provide catalog services.
C) Recover data.
D) Format user views, forms, and reports.
A) Update and retrieve data.
B) Provide catalog services.
C) Recover data.
D) Format user views, forms, and reports.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
_____ are actions that are performed on resources or files at the server.
A) HTTP methods
B) SQL keywords
C) Solution stacks
D) SQL scripts
A) HTTP methods
B) SQL keywords
C) Solution stacks
D) SQL scripts
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is information that the Access Database Documenter does not provide?
A) all objects in the database
B) relationships between tables
C) fields in each table
D) data in each field
A) all objects in the database
B) relationships between tables
C) fields in each table
D) data in each field
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What do key integrity constraints consist of?
A) smart card limitations
B) primary key and alternate key constraints
C) primary key and foreign key constraints
D) authorization permissions
A) smart card limitations
B) primary key and alternate key constraints
C) primary key and foreign key constraints
D) authorization permissions
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is an authentication tool in which information used to identify a user is stored on a physical card?
A) biometrics
B) sign-in
C) smart card
D) password
A) biometrics
B) sign-in
C) smart card
D) password
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Which Access feature restricts a field to a special format for entering data?
A) Validation Text property
B) Input Mask
C) Object Dependencies
D) Lookup properties
A) Validation Text property
B) Input Mask
C) Object Dependencies
D) Lookup properties
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following does a DBMS log typically not include for each transaction?
A) user responsible for the transaction
B) before image
C) after image
D) transaction ID
A) user responsible for the transaction
B) before image
C) after image
D) transaction ID
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
To support data independence, you should _____ in an SQL SELECT command.
A) use the * (asterisk) wildcard to represent all fields
B) avoid using more than five fields
C) explicitly list all the required fields
D) only list fields from a single table
A) use the * (asterisk) wildcard to represent all fields
B) avoid using more than five fields
C) explicitly list all the required fields
D) only list fields from a single table
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which authentication tool identifies users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics?
A) smart cards
B) data dictionaries
C) authorization
D) biometrics
A) smart cards
B) data dictionaries
C) authorization
D) biometrics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
If you want to constrain a Bonus field to the values 250, 500, and 750, what type of constraint should you apply?
A) legal values
B) fieldname
C) expression
D) integrity
A) legal values
B) fieldname
C) expression
D) integrity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Which Microsoft Access feature do you use to set legal value constraints?
A) Format
B) Data Macros
C) data type assignment
D) Validation Text property
A) Format
B) Data Macros
C) data type assignment
D) Validation Text property
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
When you run a recovery program that applies the after images of committed transactions from the log to bring a database up to date, what method of recovery are you using?
A) after recovery
B) forward recovery
C) backward recovery
D) rollback
A) after recovery
B) forward recovery
C) backward recovery
D) rollback
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
What technique is used to identify the person who is attempting to access the DBMS?
A) encryption
B) authentication
C) synchronization
D) viewing
A) encryption
B) authentication
C) synchronization
D) viewing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is not a common security feature used by database management systems?
A) encryption
B) backward recovery
C) authentication
D) authorization
A) encryption
B) backward recovery
C) authentication
D) authorization
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What type of rules specify user privileges to select, insert, update, and delete data for different tables and views?
A) encryption
B) authentication
C) authorization
D) privacy
A) encryption
B) authentication
C) authorization
D) privacy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
For which of the following tasks is data independence not a consideration?
A) changing a field property
B) modifying relationships
C) adding a new field
D) updating a record
A) changing a field property
B) modifying relationships
C) adding a new field
D) updating a record
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
What Access tool can you use to find and fix corrupt data within a database?
A) Database Documenter
B) Validation properties
C) Compact and Repair
D) Back Up Database
A) Database Documenter
B) Validation properties
C) Compact and Repair
D) Back Up Database
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which concept of a DBMS means that you change the database structure without requiring you to change the programs that access the database?
A) field independence
B) data independence
C) data integrity constraints
D) key integrity constraints
A) field independence
B) data independence
C) data integrity constraints
D) key integrity constraints
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following features does an enterprise-level DBMS use to avoid the costly and time-consuming task of having users redo their work?
A) encryption
B) record-level locking
C) phantom reads
D) journaling
A) encryption
B) record-level locking
C) phantom reads
D) journaling
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Which type of data integrity constraint states that the value entered for any field should be consistent with the data type for that field?
A) data type
B) legal value
C) format
D) secondary
A) data type
B) legal value
C) format
D) secondary
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Which Microsoft Access tool helps you identify all objects dependent on a particular table, query, form, or report?
A) Object Dependencies
B) Relationship report
C) Navigation pane
D) Database Dependencies
A) Object Dependencies
B) Relationship report
C) Navigation pane
D) Database Dependencies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What type of constraints help to ensure the accuracy and consistency of field values?
A) key integrity constraints
B) security constraints
C) referential constraints
D) data integrity constraints
A) key integrity constraints
B) security constraints
C) referential constraints
D) data integrity constraints
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
In Microsoft Access, what do you need to decrypt an encrypted database?
A) 128-bit decryption software
B) a password
C) an administrator account
D) backup software
A) 128-bit decryption software
B) a password
C) an administrator account
D) backup software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Identify the type of change that generally requires the most rework to existing programs and queries in a database and explain whether making the change is worthwhile.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following demonstrates the concept of a distributed database?
A) ACID
B) Git
C) CRUD
D) LAMP
A) ACID
B) Git
C) CRUD
D) LAMP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What type of database replication relies on centralized control that determines when replicas may be created and how they are synchronized with the master copy?
A) traditional database replication
B) distributed database model
C) local database model
D) enterprise replication
A) traditional database replication
B) distributed database model
C) local database model
D) enterprise replication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Explain how privacy and security are related and give two examples of federal requirements for keeping data private.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Compare techniques for handling concurrent updates in Access and those in larger database management systems on the web.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What do you call applying and reconciling updates from various copies of a database with the master copy?
A) synchronization
B) replication
C) atomicity
D) authentication
A) synchronization
B) replication
C) atomicity
D) authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
_____ is a popular website for hosting projects that use the Git language for version control.
A) WINS
B) Amazon Relational Database Service
C) BitBucket
D) HTTP
A) WINS
B) Amazon Relational Database Service
C) BitBucket
D) HTTP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
_____ means that a copy of a database is distributed to other computers or locations.
A) Data independence
B) Database replication
C) Database integrity
D) Data recovery
A) Data independence
B) Database replication
C) Database integrity
D) Data recovery
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Describe the legal values constraint and how to apply it to best serve database users, including an example to support your answer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Compare traditional database replication with distributed databases.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck