Finalquiz Logo

Q&A Hero

  • Home
  • Plans
  • Login
  • Register
Finalquiz Logo
  • Home
  • Plans
  • Login
  • Register

Home » Management » Page 188

Management

Q: The information stored in the is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program's abnormal termination, or a system failure such as a network discrepancy or a disk crash.a. data dictionaryb. metadatac. rollback managerd. transaction log

Q: The implicit beginning of a transaction is_____________ .a. when the database is startedb. when a table is accessed for the first timec. when the first SQL statement is encounteredd. when the COMMIT command is issued

Q: ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equivalent to a ROLLBACK?a. Five SQL statements are executed.b. The end of a program is successfully reached.c. The program is abnormally terminated.d. The database is shut down for maintenance.

Q: ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equivalent to a COMMIT?a. Five SQL statements are executed.b. The end of a program is successfully reached.c. The program is abnormally terminated.d. The database is shut down for maintenance.

Q: The ANSI has defined standards that govern SQL database transactions. Transaction support is provided by two SQL statements:_______ and ROLLBACK.a. RETRIEVEb. ASSIGNc. UPDATEd. COMMIT

Q: A single-user database system automatically ensures___________ of the database, because only one transaction is executed at a time.a. serializability and durabilityb. atomicity and isolationc. serializability and isolationd. atomicity and serializability

Q: All transactions must display______________ .a. atomicity, consistency, and durabilityb. durability and isolationc. consistency, durability, and isolationd. atomicity, durability, consistency, and isolation

Q: ____________means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.a. Serializabilityb. Atomicityc. Isolationd. Time stamping

Q: ___________requires that all operations of a transaction be completed.a. Specificityb. Atomicityc. Durabilityd. Time stamping

Q: A consistent database state is__________ .a. one in which all tables have foreign keysb. one in which all data integrity constraints are satisfiedc. one in which all tables are normalizedd. one in which all SQL statements only update one table at a time

Q: A transaction_____ is a unit of work that must be either entirely completed or aborted.a. timedb. practicalc. logicald. physical

Q: The last step in the write-through technique recovery procedure is to identify the last checkpoint in the transaction log.a. Trueb. False

Q: The transaction recovery write-ahead-log protocol ensures that transaction logs are always written before any database data are actually updated.a. Trueb. False

Q: The reason for the different levels of isolation is to increase transaction concurrency.a. Trueb. False

Q: The serializable isolation level is the least restrictive level defined by the ANSI SQL standard.a. Trueb. False

Q: When using an optimistic approach, during the write phase, the transaction is validated to ensure that the changes made will not affect the integrity and consistency of the database. a. True b. False

Q: An optimistic approach is based on the assumption that the majority of the database operations do not conflict. a. True b. False

Q: When using an optimistic approach, during the read phase, a transaction reads the database, executes the needed computations, and makes the updates to a private copy of the database values. a. True b. False

Q: Time stamping demands a lot of system resources because many transactions might have to be stopped, rescheduled, and stamped.a. Trueb. False

Q: Timestamps must only have the single property of uniqueness. a. True b. False

Q: A growing phase in a two-phase lock is when a transaction acquires all the required locks without locking any data. a. True b. False

Q: A field-level lock allows concurrent transactions to access the same row, as long as they require the use of different fields within that row. a. True b. False

Q: A shared lock produces no conflict as long as all the concurrent transactions are read-write only. a. True b. False

Q: A lock guarantees the open use of a data item to multiple transactions. a. True b. False

Q: In a page-level lock, the DBMS will lock an entire diskpage. a. True b. False

Q: A scheduler facilitates data isolation to ensure that two transactions do not update the same data element at the same time.a. Trueb. False

Q: The scheduler establishes the order in which the operations within concurrent transactions are executed.a. Trueb. False

Q: The phenomenon of uncommitted data occurs when two transactions are executed concurrently and the first transaction is rolled back after the second transaction has already accessed the uncommitted datathus violating the isolation property of transactions. a. True b. False

Q: Durability requires that all portions of the transaction must be treated as a single, logical unit of work in which all operations are applied and completed to produce a consistent database.a. Trueb. False

Q: The multiuser DBMS must implement controls to ensure serializability and isolation of transactions, in addition to atomicity and durability, in order to guard the database's consistency and integrity.a. Trueb. False

Q: Incomplete or improper transactions can have a devastating effect on database integrity. a. True b. False

Q: Serializability means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.a. Trueb. False

Q: Atomicity indicates the permanence of the database's consistent state. a. True b. False

Q: The DBMS guarantees that the semantic meaning of a transaction truly represents the real-world event. a. True b. False

Q: Although the DBMS is designed to recover a database to a previous consistent state when an interruption prevents the completion of a required set of transactions, the transactions themselves are defined by the end user or programmer and must be semantically correct.a. Trueb. False

Q: To ensure consistency of the database, every transaction must begin with the database in an unstable state. a. True b. False

Q: Most real-world database transactions are formed by only one database request. a. True b. False

Q: Programmers use database tools to___________ the applications during coding of the programs.

Q: Making sure that the final product meets user and system requirements is the most critical__________ phase.

Q: The proposed system is subject to limits known as_________ , which are external to the system.

Q: The system's_________ defines the extent of the design according to operational requirements.

Q: The__________ describes the general conditions in which a company operates, its organizational structure, and its mission.

Q: _________are usually provided by the database management system (DBMS) to check for access violations.

Q: The system and operational costs are addressed by the _________during the planning phase of the Systems Development Life Cycle (SDLC).

Q: The advent of very sophisticated application generators and_________ has substantially decreased coding and testing time.

Q: After testing is concluded, the final________ is reviewed and printed and end users are trained.

Q: An initial assessment of the information flow-and-extent requirements must be made during the _______portion of the Systems Development Life Cycle (SDLC).

Q: The traditional Systems Development Life Cycle (SDLC) phases are_________ , analysis, detailed systems design, implementation, and maintenance.

Q: _________________is the process that establishes the need for, and the extent of, an information system.

Q: A(n)____________ is a carefully designed and constructed repository of facts that is a part of a larger whole known as an information system.

Q: During decentralized design, after the___________ has been completed, all modules are integrated into one conceptual model.a. declaration processb. verification processc. conceptual processd. logical process

Q: _____________is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance.a. Conceptual designb. Network designc. Logical designd. Physical design

Q: The first step in the ER model verification process is to_______________ .a. identify each module and its componentsb. identify the ER model's central entityc. verify all processes against the ER modeld. identify each module's internal transaction requirements

Q: The first step in developing the conceptual model using ER diagrams is to ____________.a. normalize the entitiesb. complete the initial ER diagramc. identify, analyze, and refine the business rulesd. define the attributes, primary keys, and foreign keys for each of the entities

Q: In a(n)_________ , only the objects that have been updated or modified since the last full backup are backed up.a. transaction log backupb. conservative backupc. differential backupd. adaptive backup

Q: The maintenance and evolution phase of the Database Life Cycle (DBLC) involves_____________ .a. defining objectivesb. introducing changesc. testing the databased. installing the DBMS

Q: Which of the following is a hardware-induced database failure?a. Memory chip errorsb. Virusesc. Malwared. Abortion due to deadlock

Q: Once the data has been loaded into the database, the____________ tests and fine-tunes the database for performance, integrity, concurrent access, and security constraints.a. programmerb. managerc. database administratord. systems administrator

Q: In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy is__________ .a. database analysis and requirementsb. ER modeling and normalizationc. data model verificationd. distributed database design

Q: In the context of the database design process, the conceptual design step that identifies ER modules and validates insert, update, and delete rules is_____________ .a. database analysis and requirementsb. ER modeling and normalizationc. data model verificationd. distributed database design

Q: _____________can render data useless to unauthorized users who might have violated some of the database security layers.a. Data encryptionb. Access rightsc. Physical securityd. Password security

Q: In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transaction-processing requirements is ___________.a. data analysis and requirementsb. entity relationship modeling and normalizationc. data model verificationd. distributed database design

Q: The implementation and loading phase of the Database Life Cycle (DBLC) involves____________ .a. defining objectivesb. introducing changesc. testing the databased. installing the DBMS

Q: _____________is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources.a. Normalizationb. Virtualizationc. Specializationd. Generalization

Q: The database initial study phase of the Database Life Cycle (DBLC) involves___________ .a. defining objectivesb. introducing changesc. testing the databased. installing the DBMS

Q: In DBLC, the phase after the database initial study is ___________.a. operationb. database designc. database initial studyd. implementation and loading

Q: The last step in the Database Life Cycle (DBLC) is______________ .a. maintenance and evolutionb. operationc. testing and evaluationd. implementation and loading

Q: Producing the required information flow is part of the _________phase of the Database Life Cycle (DBLC).a. database initial studyb. database designc. operationd. testing and evaluation

Q: Installing the DBMS, creating the database, and loading or converting the data are part of the________ phase of the Database Life Cycle (DBLC).a. database initial studyb. database designc. implementation and loadingd. testing and evaluation

Q: Selecting database management system (DBMS) software is part of the_________ phase of the Database Life Cycle (DBLC).a. database initial studyb. database designc. implementation and loadingd. testing and evaluation

Q: Analyzing the company situation is part of the___________ phase of the Database Life Cycle (DBLC).a. database initial studyb. database designc. testing, and evaluationd. operation

Q: The implementation of_________ applications tends to prolong the operational life of systems by making them easier to update and maintain.a. database-producedb. network-producedc. CASE-producedd. design-produced

Q: There are________ stages in the Database Life Cycle (DBLC).a. fourb. fivec. sixd. seven

Q: The database contents are loaded during the _______phase of the Systems Development Life Cycle (SDLC).a. analysisb. detailed systems designc. implementationd. maintenance

Q: The design of the system's processes is completed during the___________ phase of the Systems Development Life Cycle (SDLC).a. planningb. analysisc. detailed systems designd. implementation

Q: The feasibility study during the planning phase of the Systems Development Life Cycle (SDLC) must address the: a. requirements of the current system's end users. b. problems and constraints related to the company situation. c. questions about modification and replacement of existing system. d. technical aspects of hardware and software requirements.

Q: The logical systems design is created during the________ phase of the Systems Development Life Cycle (SDLC).a. planningb. analysisc. implementationd. maintenance

Q: "What are the requirements of the current system's end users?" is a question asked during the______ phase of the Systems Development Life Cycle (SDLC).a. planningb. analysisc. implementationd. maintenance

Q: "Should the existing system be replaced?" is a question that is asked during the_________ stage of the Systems Development Life Cycle (SDLC).a. planningb. analysisc. implementationd. maintenance

Q: Installation and fine tuning are part of the_________ phase of the Systems Development Life Cycle (SDLC).a. planningb. analysisc. detailed systems designd. implementation

1 2 3 … 1,015 Next »

Subjects

Accounting Anthropology Archaeology Art History Banking Biology & Life Science Business Business Communication Business Development Business Ethics Business Law Chemistry Communication Computer Science Counseling Criminal Law Curriculum & Instruction Design Earth Science Economic Education Engineering Finance History & Theory Humanities Human Resource International Business Investments & Securities Journalism Law Management Marketing Medicine Medicine & Health Science Nursing Philosophy Physic Psychology Real Estate Science Social Science Sociology Special Education Speech Visual Arts
Links
  • Contact Us
  • Privacy
  • Term of Service
  • Copyright Inquiry
  • Sitemap
Business
  • Finance
  • Accounting
  • Marketing
  • Human Resource
  • Marketing
Education
  • Mathematic
  • Engineering
  • Nursing
  • Nursing
  • Tax Law
Social Science
  • Criminal Law
  • Philosophy
  • Psychology
  • Humanities
  • Speech

Copyright 2025 FinalQuiz.com. All Rights Reserved