Home / CSE / Database System 2 - CS :: Data and Database Administration

CSE :: Database System 2 - CS

  1. Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally?

  2. A.

     Rollback

    B.

     Rollforward

    C.

     Switch to duplicate database

    D.

     Reprocess transactions

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. Which of the following is true concerning open-source DBMS?

  4. A.

     Is free or nearly free database software whose source code is publicly available

    B.

     Is free or nearly free database software whose source code is not publicly available

    C.

     Is not competitive against PC-oriented packages and is fully SQL compliant

    D.

     Is competitive against PC-oriented packages and is not fully SQL compliant

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. Concurrency control is important for which of the following reasons?

  6. A.

     To ensure data integrity when updates occur to the database in a multiuser environment

    B.

     To ensure data integrity when updates occur to the database in a single-user environment

    C.

     To ensure data integrity while reading data occurs to the database in a multiuser environment

    D.

     To ensure data integrity while reading data occurs to the database in a single-user environment

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. Which of the following is the preferred way to recover a database after a system failure?

  8. A.

     Rollback

    B.

     Rollforward

    C.

     Switch to duplicate database

    D.

     Reprocess transactions

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. A data warehouse administrator is concerned with which of the following?

  10. A.

     The time to make a decision but not the typical roles of a database administrator

    B.

     The time to make a decision and the typical roles of a database administrator

    C.

     The typical roles of a data administrator and redesigning existing applications

    D.

     The typical roles of a database administrator and redesigning existing applications

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.

  12. A.

     True

    B.

     False

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. Failure to control confidentiality may lead to loss of competitiveness.

  14. A.

     True

    B.

     False

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. Authorization tables contain highly sensitive data and should be protected by stringent security rules.

  16. A.

     True

    B.

     False

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. A transaction log shows before and after images of records that have been modified by transactions.

  18. A.

     True

    B.

     False

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. The greatest threat to business security is often internal rather than external.

  20. A.

     True

    B.

     False

    View Answer

    Workspace

    Discuss Discuss in Forum