Synchronization between the database and the transaction log

Assignment Help Database Management System
Reference no: EM13762363

1. A point of synchronization between the database and the transaction log is called a(n):
before-image.
after-image.
recovery.
checkpoint.
None of these

2. An ACID transaction is one that is:
atomic.
consistent.
isolated.
durable.
All of these

3. As far as Microsoft Access is concerned, there are no:
recursive relationships.
1:1 relationships.
N:1 relationships.
1:N relationships.
N:M relationships

4. By default, when Microsoft Access creates a relationship between two tables, it creates a(n):
1:1 relationship.
N:M relationship.
1:N relationship.
recursive relationship.
association relationship.

5. The most commonly web server program is:
MySQL
Microsoft Access
Apache
every consequence of data values must originate in the definition of determinants and
keys.
php

6. Ensuring that each SQL statement independently processes consistent rows is known as:
process level consistency.
transaction level consistency.
independent consistency.
serializable consistency.
statement level consistency.

7. Given the PRODUCT and SUPPLIER entities in the figure below, which of the following would represent the correct placement of foreign keys?

1590_image7.png

PRODUCT (ProductID, Description, Cost)SUPPLIER (SupplierID, ContactName, PhoneNumber)PRODUCT_SUPPLIER (ProductID, SupplierID)
PRODUCT (ProductID, Description, Cost)SUPPLIER (SupplierID, ContactName, PhoneNumber)PRODUCT_SUPPLIER (ProductID, SupplierID)
PRODUCT (ProductID, Description, Cost)SUPPLIER (SupplierID, ContactName, PhoneNumber)
PRODUCT (ProductID, Description, Cost, SupplierID)SUPPLIER (SupplierID, ContactName, PhoneNumber)
PRODUCT (ProductID, Description, Cost, SupplierID)SUPPLIER (SupplierID, ContactName, PhoneNumber, ProductID)

8. Given the entities PRODUCT and SUPPLIER shown in the figure below, which of the following
would represent the correct placement of foreign keys?

2272_image 8.png

PRODUCT (ProductID, Description, Cost)SUPPLIER (SupplierID, ContactName, PhoneNumber, ProductID)
PRODUCT (ProductID, Description, Cost, SupplierID)SUPPLIER (SupplierID, ContactName, PhoneNumber)
PRODUCT (ProductID, Description, Cost)SUPPLIER (SupplierID, ContactName, PhoneNumber)
PRODUCT (ProductID, Description, Cost, SupplierID)SUPPLIER (SupplierID, ContactName, PhoneNumber, ProductID)
PRODUCT (ProductID, Description, Cost, ContactName)SUPPLIER (SupplierID, ContactName, PhoneNumber)

9. Given the generic relation: GENERIC (PKey1, PKey2, Attribute1, Attribute2, Attribute3), and the functional dependencies: (PKey1, PKey2) → Attribute1 and PKey2 → (Attribute2, Attribute3), which of the following is true?
GENERIC is not fully normalized.
PKey1 is a determinant.
PKey2 is a candidate key.
GENERIC is in DK/NF.
All of these

10. Given TABLE_A (Attribute1, Attribute2, Attribute3) and TABLE_B (Attribute4, Attribute5, Attribute6) shown in the figure below, which of the following would display the correct placement of foreign keys in the relational model?

1422_image10.png

TABLE _A (Attribute1, Attribute2, Attribute3, Attribute4, Attribute5)TABLE _B (Attribute4, Attribute5, Attribute6)
TABLE _A (Attribute1, Attribute2, Attribute3, Attribute6)TABLE _B (Attribute4, Attribute5, Attribute6)
TABLE _A (Attribute1, Attribute2, Attribute3)TABLE _B (Attribute4, Attribute5, Attribute6)
TABLE_A (Attribute1, Attribute2, Attribute3)TABLE _B (Attribute4, Attribute5, Attribute6, Attribute1)
TABLE _A (Attribute1, Attribute2, Attribute3, Attribute4)TABLE _B (Attribute4, Attribute5, Attribute6, Attribute1)

11. Preventing multiple applications from obtaining copies of the same record when the record is about to changed is called:
serialized reading.
lost updating.
concurrent processing.
resource locking.
block factoring.

12. SQL statements can be run individually or as part of a related group of SQL statements known as a(n):
Commandset.
Script.
Scriptset.
Resultset.
Result.

13. The fundamental rule of normalization can be stated as:
every table must meet the definition of a relation.
every determinant must be a candidate key.
every constraint must be a determinant.
every key must be a candidate key.
every domain must be a logical consequence of the constraints.

14. The purpose of concurrency control is to:
ensure that one user's work does not interfere with another's.
ensure that triggers do not invoke stored procedures.
ensure that each form has a corresponding report.
ensure that ASPs do not duplicate JSPs.
ensure that stored procedures do not invoke triggers.

15. The recovery technique in which the database is returned to a known state and then all valid transactions are reapplied to the database is known as:
checkpointing.
rollforward.
rollback.
reprocessing.
transaction logging.

16. The term DBA refers to the:
data business administrator.
data business auditor.
database accessor.
database auditor.
database administrator.

17. To create a 1:1 relationship between two tables in Microsoft Access:
the Indexed property of the foreign key column must be set to Yes (No Duplicates).
the Indexed property of the foreign key column must be set to No.
the Data Type of the foreign key column must be set to AutoNumber.
the Smart Tag property of the foreign key column must be set to Foreign Key.
the Indexed property of the foreign key column must be set to Yes (Duplicates OK).

18. What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a diferent transaction since the prior read?
Phantom reads
Unlocked reads
Serialized reads
Nonrepeatable reads
Dirty reads

19. What is the least restrictive isolation level that will prevent dirty reads?
Read Committed
Read Uncommitted
Atomic Read
Repeatable Read
Serializable

20. What is the least restrictive isolation level that will prevent nonrepeatable reads?
Repeatable Read
Read Uncommitted
Read Committed
Serializable
Atomic Read

21. What is the least restrictive isolation level that will prevent phantom read problems?
Read Committed
Repeatable Read
Atomic Read
Serializable
Read Uncommitted

22. What relationship pattern is illustrated in the following schema?
VehicleID in CAR must exist in VehicleID in
VEHICLE VehicleID in TRUCK must exist in VehicleID in VEHICLE
Strong entity relationship
Intersection relationship
Recursive relationship
Supertype/subtype relationship
Association relationship

23. The most commonly used language to manipulate data in a database is:
Ruby
SQL
C++
Microsoft Access

24. When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be, the transaction is said to be:
logical.
atomic.
consistent.
locked.
isolated.

25. When distributed databases create copies of the database on diferent servers, thisis known as:
replication
partitioning.
disbursing.
distributed two-phase locking.
None of these

26. Whether a lock applies to data at the record level, page level, table level, or database level is referred to as:
lock exclusivity.
lock phasing.
lock granularity.
serializable locking.
lock sharing.

27. The most commonly used database program in websites is:
MySQL
PHP
Oracle
DK/NF
Microsoft SQL Server 2

28. Which normal form is defined as any table meeting the definition of a relation?
DK/NF
4NF
BCNF
1NF
2N

29. What programming language is most often used to pass user input from a web interface to a database?
Access
PHP
Oracle
Java

30. Which of the following is not true of database recovery through reprocessing?
Reprocessing makes use of a database save.
Reprocessing takes the same amount of time as did processing in the first place.
Reprocessing will always return the database to its exact previous state.
Reprocessing requires a record of all transactions since the last time the database was saved.
All of these are true of reprocessing.

31. Which of the following is the correct technique for representing a 1:N relationship in the relational model?
The key of either relation can be placed into the other relation.
The key of the entity on the one side is placed into the relation for the entity on the many side.
The key of the child is placed into the relation of the parent.
The key of the entity on the many side is placed into the relation for the entity on the one side.
An intersection relation is created and the keys from both parent entities are placed as keys in the intersection relation

32. Which of the following is the correct technique for representing a M:N relationship using the relational model?
An intersection relation is created and the key of either entity is placed as a key in both the intersection relation and in the other relation.
An intersection relation is created with a surrogate key, which is placed in each of the parent entities.
An intersection relation is created and the keys of both parent entities are placed as a composite key in the intersection relation.
The key from either relation is placed as a foreign key in the other relation.
None of these

33. Which of the following is the first step in representing entities using the relational model?
Define a primary key.
Determine identifiers.
Determine foreign keys.
Examine the entity against normalization criteria.
Define a table for each entity.

34. Which of the following is true about a shared lock?
It is more restrictive than an implicit lock.
It locks the item from all access.
It allows only two transactions to update a record simultaneously.
It allows reads to the locked item.
It must use a two-phase locking scheme.

35. Which of the following is true about representing a weak entity with the relational model?
If the weak entity is ID-dependent, the key of the parent entity must be part of the key of the weak entity.
If the weak entity is ID-dependent, the key of the weak entity must be part of the key of the parent entity.
If the parent entity is existence-dependent, then the minimum cardinality of the weak entity is zero.
If the strong entity has a minimum cardinality of 1, the key of the weak entity must be part of the strong entity.
If the weak entity is existence-dependent, the key of the parent must be part of the key of the weak entity.

36. Which of the following is true when representing a 1:1 binary relationship using the relational model?
The key of the entity with the highest minimum cardinality must be placed in the other entity as a foreign key.
The key of either entity is placed in the other as a foreign key.
Both entities must have the same primary key.
The key of each entity must be placed in the other as a foreign key.
The key of the entity with the most attributes must be placed in the other entity as a foreign key.

37. Which of the following is not a means of processing databases?
Internet applications using ASP
Internet applications using JSP
Applications invoking stored procedures
Programs coded in C#
All of these are means of processing a database.

38. What language is most often used to pass SQL query results to a user's web interface?
Perl
Python
Linux
php

39. Which of the following would be a reason to denormalize a relation?
Relax security
Lack of design time
End user preference
Improve performance
None of these

40. Which type of lock assumes that no conflicts will occur?
Optimistic locks
Explicit locks
Shared locks
Granular locks
Open locks

Reference no: EM13762363

Questions Cloud

Available for mobile and portable internet access : List two of the options that are available for mobile and portable Internet access, and explain their strengths and weaknesses.
Strategies of both informing and persuading : Deliberative speaking uses the strategies of both informing and persuading.
Priority queue : Write a program that shows what happens when random values go first through an ordinary queue and then through a priority queue. The Queue interface specifies add and remove methods that add elements to and remove elements from a queue.
Write paper on minors should be tried as adults for crimes : Write a paper on Minors Should Be Tried As Adults For Violent Crimes.
Synchronization between the database and the transaction log : A point of synchronization between the database and the transaction log is called a(n): An ACID transaction is one that is:
Create constraints-speakers : 1. Because occasions create constraints, speakers must limit their strategic choices to what the audience expects.
Type of visual aid : Helga wants to show how the rate of traffic accidents changes for drivers as they advance in age. What type of visual aid would best represent this information?
Documentation sheet author-purpose : Data imported from SalesData.csv text file located in Course Project Materials in DocSharing. Professional formatting follows the formatting guidelines. Documentation sheet added to provide author, purpose, and date and provide information about e..
How would you describe your chosen companys dividend policy : How would you describe your chosen company's dividend policy? Why do you believe this company chose the dividend policy they have in place?

Reviews

Write a Review

Database Management System Questions & Answers

  Evaluate a dbms in terms of lock granularity

Suppose you are asked to evaluate a DBMS in terms of lock granularity and the different locking levels. Create a simple database environment in which these features would be important.

  Review the subsequent list of data management difficulties

how data warehousing, online transactional databases, and data mining can solve or reduce these difficulties. Be specific.

  Prepare the relational schema for database

Prepare the relational schema for database

  Create a sql statement and execute the same in sqlplus

Statistics can be created on tables, indexes columns and as well as on the individual columns. But, if for some reason table or index statistics have not been updated, then this may result in a full table scan.

  Part a - use cases perform a requirements analysis for the

part a - use cases perform a requirements analysis for the case study. express the results using the following

  What is the cardinality of an entity

What is the cardinality of an entity - Why is it useful to consider the cardinality when designing a database?

  Systems administrator for your school

Using the Web, identify the chief information officer, chief information security officer, and systems administrator for your school. Which of these individuals represents the data owner? Data custodian

  Analyzing hard-to-obtain data from two separate databases

You are interested in analyzing some hard-to-obtain data from two separate databases. Each database contains n numerical values.

  1 start with checksalary trigger explain below on triggers

1 start with checksalary trigger explain below on triggers. show that that trigger creates muttating table error. in

  Explain data mining write the major characteristics and

define data mining. what are the major characteristics and objectives associated with data mining? what professions

  Design diagram data warehouse using star schema

Assume that data warehouse consists of three dimensions time, customer, and cell phone plan, and two measures number of calls and cell phone bill. Sketch a schema diagram for above data warehouse using star schema.

  What is the goal of computer forensics

From your knowledge and experience how are computer forensic investigators, in today's world of complex technology, are able to retrieve and analyze data that can be used in computer forensic investigations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd