40 Questions
What occurs in a relation when records are added or removed?
The cardinality of the relation is fixed but the degree varies.
What database protection technique should be employed to prioritize security over processing speed?
Encryption
What is a composite key?
A primary or foreign key that consists of two or more attributes of a relation.
What process is used to prevent the current database operation from reading or writing a data item while it is being accessed by another operation?
Lock
Which of the following is NOT a characteristic of file-based database systems?
Data independence
What is the correct order of the database design activities?
4, 3, 2, 1
Why is encryption used in a database system?
To enhance data security
What is the main advantage of using a database management system?
All of the above
What is the term that describes the management of simultaneous transactions to prevent conflicts?
Concurrency control
When would the DBMS use a serial schedule to execute transactions?
Concurrent transactions read or write the same data structure.
What is the correct ordering of activities by assigned numbers?
1,2,3,4
What is a characteristic that applies to all types of databases?
Data that is stored in a structured manner
What is an entity in the context of databases?
An item about which information is stored
What is white-box testing of software?
The database designer tests the software because they are able to make necessary changes to the underlying code.
Which SQL language is used to limit access to a database or its data?
Data Control Language
What is a data dictionary?
A system catalog containing user data
Which subset of Structured Query Language (SQL) is used to perform operations such as data retrieval or deletion?
Data Manipulation Language
What is the primary function of concurrency control in a database?
To manage simultaneous transactions to prevent conflicts
Which area of database security involves maintaining access to enterprise data?
Availability
What type of testing involves testing the software with knowledge of the underlying code?
White-box testing
How do you remove alteration privileges from a group of users?
REVOKE INSERT, UPDATE, DELETE ON Employees FROM Group_2;
What mechanism provides controlled access to the database through virtual tables?
View
What is the term for a database application that has entered the testing phase?
QA-ready
Which database architecture is best suited for implementation in the World Wide Web environment?
Three-tier using thin client
What type of entity-relationship model lacks redundant data?
Normalized relations
What is a database operation that is executed as a single unit?
Transaction
Which type of tables should triggers avoid referencing?
Very large tables
What type of partitioning is suitable for reducing backup volumes?
Range Partitioning
What feature should be omitted from a highly available data warehouse design?
Global nonpartitioned indexes
Which two features provide fine-grained access control?
Advanced Security Option and Oracle Database Vault
Which security feature allows access control based on values in individual records?
Oracle Label Security
What is required for instance recovery after a power outage?
Inactive and current redo log files
What is required to accomplish instance recovery?
Online and archived redo files
What happens to the SKD user after the command SQL>ALTER USR skd ACCOUNT LOCK; is executed?
The user cannot log in to the database instance
In which database state would you need to be to re-create the control files?
MOUNT
What is Possession in the context of Access Management?
Not a concept within the Access Management process
What is an Alert in the context of IT service management?
A warning that a threshold has been reached
What is the purpose of creating intermediate entities during logical database design?
To resolve complex, recursive, and many-to-many relationships
Which process is responsible for recording relationships between service components?
Service Asset and Configuration Management
What is the effect of the command SQL>ALTER USR skd ACCOUNT LOCK; on the objects owned by the SKD user?
The objects are accessible to other users with permission
Study Notes
Database Concepts
- When records are added or removed from a relation, the degree of the relation varies, but the cardinality remains fixed.
- To prioritize security over processing speed, encryption protection technique should be employed.
Database Security
- Composite key is a primary or foreign key that consists of two or more attributes of a relation.
- To prevent simultaneous database operations from reading or writing a data item, the lock process is used.
- Data dictionary is metadata that is stored in tables and is only accessible by the DBMS.
Database Design
- In database design, entities are items about which information is stored.
- normalization is applied before determining entities.
- Designing user views is a later step in the database design process.
SQL and Database Management
- Data Control Language (DCL) is a subset of SQL used to limit access to a database or its data.
- REVOKE command is used to remove privileges from a user or group.
- Views provide controlled access to the database through virtual tables.
Database Architecture
- Three-tier architecture using thin client is suitable for the World Wide Web environment.
- Concurrency control is the management of simultaneous transactions to prevent conflicts.
Transactions and Control
- Serialization ensures that transactions are executed in a predictable order to prevent conflicts.
- A serial schedule is used when concurrent transactions read or write the same data structure.
- A transaction is a single unit of one or more database operations.
Testing and Quality Assurance
- White-box testing involves testing the software with knowledge of the underlying code.
Partitioning and Data Warehousing
- Range Partitioning is suitable for scenarios where older data does not need to be backed up frequently.
- Partitioning and RAC (Real Application Clusters) are features that provide high availability.
Database Administration
- Redo log files are required for instance recovery after a power outage.
- The ALTER USR command with ACCOUNT LOCK option locks a user account.
Access Management and Security
- Identity, Rights, and Access are concepts within the Access Management process.
- An alert is a warning that a threshold has been reached, something has changed, or a failure has occurred.
Database Design and Modeling
- Intermediate entities are created during logical database design to resolve complex, recursive, and many-to-many relationships.
Test your knowledge of database systems, including relations, cardinality, and security techniques.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free