Which of the following is true concerning open-source DBMS?
Which of the following is true concerning open-source DBMS?
The transaction log includes which of the following?
The transaction log includes which of the following?
Mirrored databases are almost always provided in high-availability systems.
Mirrored databases are almost always provided in high-availability systems.
Which of the following could cause data to be unavailable?
Which of the following could cause data to be unavailable?
To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.
To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.
Queries that do full table scans should be avoided.
Queries that do full table scans should be avoided.
Which of the following is the preferred way to recover a database after a system failure?
Which of the following is the preferred way to recover a database after a system failure?
With concurrent processing involving updates, a database with concurrency control will be compromised due to interference between users.
With concurrent processing involving updates, a database with concurrency control will be compromised due to interference between users.
Locking may cause which of the following problems?
Locking may cause which of the following problems?
If both data and database administration exist in an organization, the database administrator is responsible for which of the following?
If both data and database administration exist in an organization, the database administrator is responsible for which of the following?
A disaster recovery plan does not need to include the shipment of database backups to other sites.
A disaster recovery plan does not need to include the shipment of database backups to other sites.
The greatest threat to business security is often internal rather than external.
The greatest threat to business security is often internal rather than external.
A transaction log shows before and after images of records that have been modified by transactions.
A transaction log shows before and after images of records that have been modified by transactions.
Concurrency control is important for which of the following reasons?
Concurrency control is important for which of the following reasons?
Data modeling and database design are key responsibilities of data and data base administration.
Data modeling and database design are key responsibilities of data and data base administration.
Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally?
Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally?
A traditional data administrator performs which of the following roles?
A traditional data administrator performs which of the following roles?
A shared lock allows which of the following types of transactions to occur?
A shared lock allows which of the following types of transactions to occur?
Information repositories are replacing data dictionaries in many organizations.
Information repositories are replacing data dictionaries in many organizations.
Incorrect data is easy to detect.
Incorrect data is easy to detect.
Failure to control confidentiality may lead to loss of competitiveness.
Failure to control confidentiality may lead to loss of competitiveness.
Databases are not the property of a single function or individual within the organization.
Databases are not the property of a single function or individual within the organization.
A data warehouse administrator is concerned with which of the following?
A data warehouse administrator is concerned with which of the following?
Backward recovery is which of the following?
Backward recovery is which of the following?
Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally.
Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally.
Poor data administration can lead to which of the following?
Poor data administration can lead to which of the following?
The restore/rerun technique involves reprocessing the day's transactions up to the point of failure.
The restore/rerun technique involves reprocessing the day's transactions up to the point of failure.
Performance analysis and tuning is which of the following?
Performance analysis and tuning is which of the following?
Authorization tables contain highly sensitive data and should be protected by stringent security rules.
Authorization tables contain highly sensitive data and should be protected by stringent security rules.
Which of the following is part of an administrative policy to secure a database?
Which of the following is part of an administrative policy to secure a database?