0% found this document useful (0 votes)
50 views21 pages

Exam PDF

Uploaded by

aprtravelandtour
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views21 pages

Exam PDF

Uploaded by

aprtravelandtour
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

• ►

• Final Exam (Proctored)

Question 1

Answer saved
Marked out of 1.00

Flag question

Question text

What do all database applications have?

Select one:
a. A front-end and a back-end.
b. An application port interface (API) and a data pipe (DP)
c. An error-correction system and a recovery system
d. High level end-to-end encryption
e. A data port and a telenovela feed

Question 2

Answer saved
Marked out of 1.00

Flag question

Question text

What two main types of indices exist in databases?

Select one:
a. Multiple and singular indices
b. Internal and external indices
c. Ordered and hash indices
d. Upper and lower indices
e. Encrypted and decrypted indices

Question 3

Answer saved
Marked out of 1.00

Flag question

Question text

Logical, physical and view levels are elements of the model of…

Select one:
a. Entity Relationship (ER)
b. Data Abstraction
c. Domain Model Language (DML)
d. Domain Object Model (DOM)
e. Backup and Recovery

Question 4

Answer saved
Marked out of 1.00

Flag question

Question text

What do you call a statement that the system executes automatically as a side effect of a
modification to the database.

Select one:
a. A finger
b. A bump
c. A trigger
d. A snap
e. A wedge

Question 5

Answer saved
Marked out of 1.00

Flag question

Question text

What does the Acronym SQL stand for?

Select one:
a. Select Query Logic
b. Structured Query Language
c. Similar Query Listing
d. Search Query Listing
e. Search Query Language

Question 6

Answer saved
Marked out of 1.00

Flag question

Question text
In databases, what is a common name for a unit of storage that can store one or more records?

Select one:
a. A barrel
b. A cask
c. A bottle
d. A bucket
e. A flask

Question 7

Answer saved
Marked out of 1.00

Flag question

Question text

What is a method of recovery from a deadlock?

Select one:
a. Dieting
b. Weightwatching
c. Detoxing
d. Starvation
e. Fasting

Question 8

Answer saved
Marked out of 1.00

Flag question
Question text

What kind of cardinality does NOT exist in databases?

Select one:
a. one-to-one
b. one-to-many
c. some-to-some
d. many-to-one
e. many-to-many

Question 9

Answer saved
Marked out of 1.00

Flag question

Question text

What statement do you need to type in SQL to take away access rights from a user?

Select one:
a. TAKE
b. KILL
c. REVOKE
d. LOSE
e. DENY

Question 10

Answer saved
Marked out of 1.00
Flag question

Question text

Which of the following is a standard application programming interface (API) for accessing
database management systems?

Select one:
a. CORBA
b. BINGO
c. JPLUS
d. ODBC
e. DB2

Question 11

Answer saved
Marked out of 1.00

Flag question

Question text

What is the purpose of “degree-two consistency”?

Select one:
a. To avoid cascading aborts without necessarily ensuring serializability.
b. To avoid serializable aborts without necessarily ensuring a cascade.
c. To avoid aborting cascades without serializing ensurability.
d. To abort cascading avoidances without ensuring serializability.
e. To ensure cascading aborts without avoiding serializability
Question 12

Answer saved
Marked out of 1.00

Flag question

Question text

In order to ensure efficient and secure data storage on magnetic disks, a variety of disk-
organization techniques exist. What is the collective name for them?

Select one:
a. Integrated drive electronics (IDE)
b. Redundant arrays of independent disks (RAID)
c. Small computer systems interconnect (SCSI)
d. AT attachment (ATA)
e. Magnetic Unit Detection (MUD)

Question 13

Answer saved
Marked out of 1.00

Flag question

Question text

What do you call an index if the index record contains the search-key value and a pointer to the
first data record with that search-key value?

Select one:
a. A loose primary index
b. A dense primary index
c. A compact primary index
d. A sparse primary index
e. A crowded primary index

Question 14

Answer saved
Marked out of 1.00

Flag question

Question text

What is typically used as to manage concurrency control in databases?

Select one:
a. Control bits
b. Timestamps
c. Version numbers
d. Error correction algorithms
e. Training of database users

Question 15

Answer saved
Marked out of 1.00

Flag question

Question text

What is a fundamental security objective for databases?

Select one:
a. Data cleansing
b. Smooth flow of data
c. Data aesthetics
d. Access control
e. Data normalization

Question 16

Answer saved
Marked out of 1.00

Flag question

Question text

When you wish to graphically express a database schema in an E-R diagram, which of the
followingrepresents entity sets?

Select one:
a. Rectangles
b. Ellipses
c. Diamonds
d. Lines
e. Dots

Question 17

Answer saved
Marked out of 1.00

Flag question

Question text

What do you call it if you restore data from a backup?


Select one:
a. Recursion
b. Reincarnation
c. Recovery
d. Recourse
e. Restitution

Question 18

Answer saved
Marked out of 1.00

Flag question

Question text

Which is NOT a join type?

Select one:
a. Upper join
b. Inner join
c. Left outer join
d. Right outer join
e. Full outer join

Question 19

Answer saved
Marked out of 1.00

Flag question

Question text
In computing and/or databases, a bottleneck is a…

Select one:
a. place where the data stream gets more narrow.
b. place where the data stream goes faster.
c. thing that causes a traffic jam on the data highway.
d. component of a system that is responsible for limiting its performance.
e. component of a system that is not responsible for limiting its performance.

Question 20

Answer saved
Marked out of 1.00

Flag question

Question text

What is NOT an example for physical storage media?

Select one:
a. Tape storage
b. Optical storage
c. Cache
d. Main Memory
e. Cloud


• Final Exam (Proctored)

Question 21

Answer saved

Marked out of 1.00


Flag question

Question text

One of the more common buffer replacement strategies is called LRU. What is its meaning?

Select one:

a. Lost, received, uncovered

b. Last record used

c. Latest relation uploaded

d. Least recently used

e. Long RAM usage

Question 22

Answer saved

Marked out of 1.00

Flag question

Question text

What is the meaning of the NULL value in databases?

Select one:

a. Absence of information.

b. You cannot safely overwrite this value.

c. Everything you write in this data field will become NULL.


d. No user can access this value.

e. Division by this value will result in catastrophic data loss.

Question 23

Answer saved

Marked out of 1.00

Flag question

Question text

What is it called when you exchange a hard disk without turning the computer’s power off?

Select one:

a. Heat hopping

b. Running hot

c. Hot swapping

d. Warm switching

e. Fast tracking

Question 24

Answer saved

Marked out of 1.00

Flag question

Question text
The round-robin strategy…

Select one:

a. … is known to be redundant, but there is no data operation without it.

b. … makes assumptions of efficiency of disks and writes comments in a log file.

c. … ensures an even distribution of tuples across disks.

d. … goes around the disk scanning for available space and earmarking it for the next write
transaction.

e. ... uses a spiraling search pattern to find and resolve data errors.

Question 25

Answer saved

Marked out of 1.00

Flag question

Question text

SQL is a …

Select one:

a. Data Definition Language (DDL)

b. Database Control Language (DCL)

c. Database Command Interface (DCI)

d. Data Mining Programming Language (DMPL)

e. Data Retrieval Dialect (DRD)

Question 26
Answer saved

Marked out of 1.00

Flag question

Question text

What operation is responsible for the retrieval of information from a database in a transaction
schedule?

Select one:

a. Get

b. Pull

c. See

d. Read

e. Retrieve

Question 27

Answer saved

Marked out of 1.00

Flag question

Question text

Which of the following is NOT a property of transactions?

Select one:

a. Atomicity
b. Consistency

c. Integrity

d. Isolation

e. Durability

Question 28

Answer saved

Marked out of 1.00

Flag question

Question text

What two types of Data-Manipulation Languages (DML) do exist?

Select one:

a. Atomic and molecular DMLs

b. Big and little DMLs

c. General and specific DMLs

d. Ultraprocedural and infraprocedural DMLs

e. Procedural and declarative DMLs

Question 29

Answer saved

Marked out of 1.00


Flag question

Question text

In database workflows, what kind of property can a deadline have?

Select one:

a. stringent

b. hard

c. opaque

d. solid

e. timed

Question 30

Answer saved

Marked out of 1.00

Flag question

Question text

Which of the following are the main data types in mobile applications?

Select one:

a. Relational data, mobile data, meteological data


b. Ubiquitous data, waypoints, numerical data

c. Temporal data, spatial data, mobile databases

d. Transactional data, phone numbers, backup/recovery data points

e. Fresh data, old data, mixed data.

Question 31

Answer saved

Marked out of 1.00

Flag question

Question text

Which of the following is a requirement for databases when multimedia data are to be stored?

Select one:

a. The database must be wiped or have a clean install before using it for multimedia.

b. The database must support large objects.

c. The database must have a virus check for each write or read transaction.

d. The database must be kept in an encrypted data volume.

e. All of the above.

Question 32

Answer saved

Marked out of 1.00


Flag question

Question text

How do you give a user access privileges in SQL?

Select one:

a. With the GIVE statement.

b. With the ACCESS statement.

c. With the AVAIL statement.

d. With the GRANT statement.

e. With the REVEAL statement.

Question 33

Answer saved

Marked out of 1.00

Flag question

Question text

Which of the following is NOT one of the factors that organizations should consider for backup
solutions?

Select one:

a. Reliability

b. Cost
c. Capacity

d. Average usage rate

Question 34

Answer saved

Marked out of 1.00

Flag question

Question text

What are the phases of a transaction?

Select one:

a. Control, check and read phase

b. Assert, commit and verify phase.

c. Put, get and execute phase.

d. Read, validation and write phase.

e. Leech, seed and share phase.

Question 35

Answer saved

Marked out of 1.00

Flag question

Question text
Which of the following are partitioning techniques?

Select one:

a. Round-robin

b. Hash partitioning

c. Range partitioning

d. All of the above

e. None of the above

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy