Home / CSE / Database System 2 - CS :: Data and Database Administration

CSE :: Database System 2 - CS

  1. Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally?

  2. A.

     Rollback

    B.

     Rollforward

    C.

     Switch to duplicate database

    D.

     Reprocess transactions


  3. Which of the following is true concerning open-source DBMS?

  4. A.

     Is free or nearly free database software whose source code is publicly available

    B.

     Is free or nearly free database software whose source code is not publicly available

    C.

     Is not competitive against PC-oriented packages and is fully SQL compliant

    D.

     Is competitive against PC-oriented packages and is not fully SQL compliant


  5. Concurrency control is important for which of the following reasons?

  6. A.

     To ensure data integrity when updates occur to the database in a multiuser environment

    B.

     To ensure data integrity when updates occur to the database in a single-user environment

    C.

     To ensure data integrity while reading data occurs to the database in a multiuser environment

    D.

     To ensure data integrity while reading data occurs to the database in a single-user environment


  7. Which of the following is the preferred way to recover a database after a system failure?

  8. A.

     Rollback

    B.

     Rollforward

    C.

     Switch to duplicate database

    D.

     Reprocess transactions


  9. A data warehouse administrator is concerned with which of the following?

  10. A.

     The time to make a decision but not the typical roles of a database administrator

    B.

     The time to make a decision and the typical roles of a database administrator

    C.

     The typical roles of a data administrator and redesigning existing applications

    D.

     The typical roles of a database administrator and redesigning existing applications


  11. To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.

  12. A.

     True

    B.

     False


  13. Failure to control confidentiality may lead to loss of competitiveness.

  14. A.

     True

    B.

     False


  15. Authorization tables contain highly sensitive data and should be protected by stringent security rules.

  16. A.

     True

    B.

     False


  17. A transaction log shows before and after images of records that have been modified by transactions.

  18. A.

     True

    B.

     False


  19. The greatest threat to business security is often internal rather than external.

  20. A.

     True

    B.

     False