QUESTIONS AND ANSWERS
_______ has been enhanced with extensions that support
OLAP type processing and data generation
DBMS
Data stored in the company database must be protected from
access by unauthorized users. Data measures include all of the
following EXCEPT....
Top-down authentication
The following is NOT a factor that influences the choice of
database design strategies
The company's market knowledge
What describes the extent to which modules are independent
of one another?
Module coupling
What are the three main types of indexes?
Primary, Secondary, and Multi-level index
The ____ lock allows concurrent transactions to access the
same row as long as they require the use of different fields
within that row
Field-level
,The following are the deadlock control techniques
Prevention, detection and avoidance
Concurrency control with optimistic methods moves through
which phases?
Validation, write and read
_____________design is the process of selecting the data
storage and data access characteristics of the database
Physical
In the ________________ stage, data modeling is used to
create an abstract database structure that represents real-
world objects in the most realistic way possible
Conceptual design
What is the first step in converting the ER model from the
conceptual design phase into a set of relations?
Create Relations for Strong Entities
A ______ is often used on multidimensional data held in data
warehouses
Bitmap index
In the following relation, what is the primary key?
RENT_LINE (RENT_NUM, RENT_LINE_NUM,
RENT_LINE_CHARGE, DATE,COPY_CODE*)
, RENT_NUM and RENT_LINE_NUM
______ is a brief and precise narrative description of a policy,
procedure or principle within a specific organization's
environment
Business rule
Indexes should NOT be used when_______
Tables have low sparsity
If several concurrent transactions are executed over the same
data set and the second transaction updates the database
before the first transaction is finished, the ____ property is
violated and the database is no longer consistent
Durability
When a program is abnormally terminated, the equivalent of a
____ command occurs
ROLLBACK
In _____ backup of the database, only the best modifications
to the database are copied
Differential
All lock information is managed by a ____, which is
responsible for assigning and policing the locks used by the
transactions
Lock manager