Database Systems Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What occurs in a relation when records are added or removed?

  • The number of domains changes.
  • The degree of the relation is fixed but the cardinality varies.
  • The cardinality of the relation is fixed but the degree varies. (correct)
  • The attributes in the domain change.

What database protection technique should be employed to prioritize security over processing speed?

  • Integrity controls
  • Backups
  • Encryption (correct)
  • User views

What is a composite key?

  • A primary or foreign key defined by its parent keys.
  • A foreign key that consists of the same attributes as the primary key from a related table.
  • A primary key that consists of the first two attributes of a relation.
  • A primary or foreign key that consists of two or more attributes of a relation. (correct)

What process is used to prevent the current database operation from reading or writing a data item while it is being accessed by another operation?

<p>Lock (A)</p> Signup and view all the answers

Which of the following is NOT a characteristic of file-based database systems?

<p>Data independence (A)</p> Signup and view all the answers

What is the correct order of the database design activities?

<p>4, 3, 2, 1 (D)</p> Signup and view all the answers

Why is encryption used in a database system?

<p>To enhance data security (B)</p> Signup and view all the answers

What is the main advantage of using a database management system?

<p>All of the above (D)</p> Signup and view all the answers

What is the term that describes the management of simultaneous transactions to prevent conflicts?

<p>Concurrency control (B)</p> Signup and view all the answers

When would the DBMS use a serial schedule to execute transactions?

<p>Concurrent transactions read or write the same data structure. (C)</p> Signup and view all the answers

What is the correct ordering of activities by assigned numbers?

<p>1,2,3,4 (B)</p> Signup and view all the answers

What is a characteristic that applies to all types of databases?

<p>Data that is stored in a structured manner (D)</p> Signup and view all the answers

What is an entity in the context of databases?

<p>An item about which information is stored (D)</p> Signup and view all the answers

What is white-box testing of software?

<p>The database designer tests the software because they are able to make necessary changes to the underlying code. (A)</p> Signup and view all the answers

Which SQL language is used to limit access to a database or its data?

<p>Data Control Language (D)</p> Signup and view all the answers

What is a data dictionary?

<p>A system catalog containing user data (D)</p> Signup and view all the answers

Which subset of Structured Query Language (SQL) is used to perform operations such as data retrieval or deletion?

<p>Data Manipulation Language (B)</p> Signup and view all the answers

What is the primary function of concurrency control in a database?

<p>To manage simultaneous transactions to prevent conflicts (D)</p> Signup and view all the answers

Which area of database security involves maintaining access to enterprise data?

<p>Availability (D)</p> Signup and view all the answers

What type of testing involves testing the software with knowledge of the underlying code?

<p>White-box testing (A)</p> Signup and view all the answers

How do you remove alteration privileges from a group of users?

<p>REVOKE INSERT, UPDATE, DELETE ON Employees FROM Group_2; (B)</p> Signup and view all the answers

What mechanism provides controlled access to the database through virtual tables?

<p>View (A)</p> Signup and view all the answers

What is the term for a database application that has entered the testing phase?

<p>QA-ready (D)</p> Signup and view all the answers

Which database architecture is best suited for implementation in the World Wide Web environment?

<p>Three-tier using thin client (B)</p> Signup and view all the answers

What type of entity-relationship model lacks redundant data?

<p>Normalized relations (C)</p> Signup and view all the answers

What is a database operation that is executed as a single unit?

<p>Transaction (B)</p> Signup and view all the answers

Which type of tables should triggers avoid referencing?

<p>Very large tables (A)</p> Signup and view all the answers

What type of partitioning is suitable for reducing backup volumes?

<p>Range Partitioning (B)</p> Signup and view all the answers

What feature should be omitted from a highly available data warehouse design?

<p>Global nonpartitioned indexes (A)</p> Signup and view all the answers

Which two features provide fine-grained access control?

<p>Advanced Security Option and Oracle Database Vault (B)</p> Signup and view all the answers

Which security feature allows access control based on values in individual records?

<p>Oracle Label Security (A)</p> Signup and view all the answers

What is required for instance recovery after a power outage?

<p>Inactive and current redo log files (A)</p> Signup and view all the answers

What is required to accomplish instance recovery?

<p>Online and archived redo files (B)</p> Signup and view all the answers

What happens to the SKD user after the command SQL>ALTER USR skd ACCOUNT LOCK; is executed?

<p>The user cannot log in to the database instance (A)</p> Signup and view all the answers

In which database state would you need to be to re-create the control files?

<p>MOUNT (C)</p> Signup and view all the answers

What is Possession in the context of Access Management?

<p>Not a concept within the Access Management process (B)</p> Signup and view all the answers

What is an Alert in the context of IT service management?

<p>A warning that a threshold has been reached (D)</p> Signup and view all the answers

What is the purpose of creating intermediate entities during logical database design?

<p>To resolve complex, recursive, and many-to-many relationships (D)</p> Signup and view all the answers

Which process is responsible for recording relationships between service components?

<p>Service Asset and Configuration Management (B)</p> Signup and view all the answers

What is the effect of the command SQL>ALTER USR skd ACCOUNT LOCK; on the objects owned by the SKD user?

<p>The objects are accessible to other users with permission (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Database Concepts

  • When records are added or removed from a relation, the degree of the relation varies, but the cardinality remains fixed.
  • To prioritize security over processing speed, encryption protection technique should be employed.

Database Security

  • Composite key is a primary or foreign key that consists of two or more attributes of a relation.
  • To prevent simultaneous database operations from reading or writing a data item, the lock process is used.
  • Data dictionary is metadata that is stored in tables and is only accessible by the DBMS.

Database Design

  • In database design, entities are items about which information is stored.
  • normalization is applied before determining entities.
  • Designing user views is a later step in the database design process.

SQL and Database Management

  • Data Control Language (DCL) is a subset of SQL used to limit access to a database or its data.
  • REVOKE command is used to remove privileges from a user or group.
  • Views provide controlled access to the database through virtual tables.

Database Architecture

  • Three-tier architecture using thin client is suitable for the World Wide Web environment.
  • Concurrency control is the management of simultaneous transactions to prevent conflicts.

Transactions and Control

  • Serialization ensures that transactions are executed in a predictable order to prevent conflicts.
  • A serial schedule is used when concurrent transactions read or write the same data structure.
  • A transaction is a single unit of one or more database operations.

Testing and Quality Assurance

  • White-box testing involves testing the software with knowledge of the underlying code.

Partitioning and Data Warehousing

  • Range Partitioning is suitable for scenarios where older data does not need to be backed up frequently.
  • Partitioning and RAC (Real Application Clusters) are features that provide high availability.

Database Administration

  • Redo log files are required for instance recovery after a power outage.
  • The ALTER USR command with ACCOUNT LOCK option locks a user account.

Access Management and Security

  • Identity, Rights, and Access are concepts within the Access Management process.
  • An alert is a warning that a threshold has been reached, something has changed, or a failure has occurred.

Database Design and Modeling

  • Intermediate entities are created during logical database design to resolve complex, recursive, and many-to-many relationships.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

01_Database 1.pdf

More Like This

Use Quizgecko on...
Browser
Browser