Database Systems Quiz

InspirationalDetroit avatar
InspirationalDetroit
·
·
Download

Start Quiz

Study Flashcards

40 Questions

What occurs in a relation when records are added or removed?

The cardinality of the relation is fixed but the degree varies.

What database protection technique should be employed to prioritize security over processing speed?

Encryption

What is a composite key?

A primary or foreign key that consists of two or more attributes of a relation.

What process is used to prevent the current database operation from reading or writing a data item while it is being accessed by another operation?

Lock

Which of the following is NOT a characteristic of file-based database systems?

Data independence

What is the correct order of the database design activities?

4, 3, 2, 1

Why is encryption used in a database system?

To enhance data security

What is the main advantage of using a database management system?

All of the above

What is the term that describes the management of simultaneous transactions to prevent conflicts?

Concurrency control

When would the DBMS use a serial schedule to execute transactions?

Concurrent transactions read or write the same data structure.

What is the correct ordering of activities by assigned numbers?

1,2,3,4

What is a characteristic that applies to all types of databases?

Data that is stored in a structured manner

What is an entity in the context of databases?

An item about which information is stored

What is white-box testing of software?

The database designer tests the software because they are able to make necessary changes to the underlying code.

Which SQL language is used to limit access to a database or its data?

Data Control Language

What is a data dictionary?

A system catalog containing user data

Which subset of Structured Query Language (SQL) is used to perform operations such as data retrieval or deletion?

Data Manipulation Language

What is the primary function of concurrency control in a database?

To manage simultaneous transactions to prevent conflicts

Which area of database security involves maintaining access to enterprise data?

Availability

What type of testing involves testing the software with knowledge of the underlying code?

White-box testing

How do you remove alteration privileges from a group of users?

REVOKE INSERT, UPDATE, DELETE ON Employees FROM Group_2;

What mechanism provides controlled access to the database through virtual tables?

View

What is the term for a database application that has entered the testing phase?

QA-ready

Which database architecture is best suited for implementation in the World Wide Web environment?

Three-tier using thin client

What type of entity-relationship model lacks redundant data?

Normalized relations

What is a database operation that is executed as a single unit?

Transaction

Which type of tables should triggers avoid referencing?

Very large tables

What type of partitioning is suitable for reducing backup volumes?

Range Partitioning

What feature should be omitted from a highly available data warehouse design?

Global nonpartitioned indexes

Which two features provide fine-grained access control?

Advanced Security Option and Oracle Database Vault

Which security feature allows access control based on values in individual records?

Oracle Label Security

What is required for instance recovery after a power outage?

Inactive and current redo log files

What is required to accomplish instance recovery?

Online and archived redo files

What happens to the SKD user after the command SQL>ALTER USR skd ACCOUNT LOCK; is executed?

The user cannot log in to the database instance

In which database state would you need to be to re-create the control files?

MOUNT

What is Possession in the context of Access Management?

Not a concept within the Access Management process

What is an Alert in the context of IT service management?

A warning that a threshold has been reached

What is the purpose of creating intermediate entities during logical database design?

To resolve complex, recursive, and many-to-many relationships

Which process is responsible for recording relationships between service components?

Service Asset and Configuration Management

What is the effect of the command SQL>ALTER USR skd ACCOUNT LOCK; on the objects owned by the SKD user?

The objects are accessible to other users with permission

Study Notes

Database Concepts

  • When records are added or removed from a relation, the degree of the relation varies, but the cardinality remains fixed.
  • To prioritize security over processing speed, encryption protection technique should be employed.

Database Security

  • Composite key is a primary or foreign key that consists of two or more attributes of a relation.
  • To prevent simultaneous database operations from reading or writing a data item, the lock process is used.
  • Data dictionary is metadata that is stored in tables and is only accessible by the DBMS.

Database Design

  • In database design, entities are items about which information is stored.
  • normalization is applied before determining entities.
  • Designing user views is a later step in the database design process.

SQL and Database Management

  • Data Control Language (DCL) is a subset of SQL used to limit access to a database or its data.
  • REVOKE command is used to remove privileges from a user or group.
  • Views provide controlled access to the database through virtual tables.

Database Architecture

  • Three-tier architecture using thin client is suitable for the World Wide Web environment.
  • Concurrency control is the management of simultaneous transactions to prevent conflicts.

Transactions and Control

  • Serialization ensures that transactions are executed in a predictable order to prevent conflicts.
  • A serial schedule is used when concurrent transactions read or write the same data structure.
  • A transaction is a single unit of one or more database operations.

Testing and Quality Assurance

  • White-box testing involves testing the software with knowledge of the underlying code.

Partitioning and Data Warehousing

  • Range Partitioning is suitable for scenarios where older data does not need to be backed up frequently.
  • Partitioning and RAC (Real Application Clusters) are features that provide high availability.

Database Administration

  • Redo log files are required for instance recovery after a power outage.
  • The ALTER USR command with ACCOUNT LOCK option locks a user account.

Access Management and Security

  • Identity, Rights, and Access are concepts within the Access Management process.
  • An alert is a warning that a threshold has been reached, something has changed, or a failure has occurred.

Database Design and Modeling

  • Intermediate entities are created during logical database design to resolve complex, recursive, and many-to-many relationships.

Test your knowledge of database systems, including relations, cardinality, and security techniques.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Unlock the Power of DBMS
11 questions
DBMS Quiz
3 questions

DBMS Quiz

TopIndicolite avatar
TopIndicolite
Use Quizgecko on...
Browser
Browser