Filters
Question type

____ a database reverses encryption.​


A) ​Locking
B) ​Decrypting
C) ​Synchronizing
D) ​Timestamping

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Explain the difference between a procedural language and a nonprocedural language.Give at least one example of each type of language.​

Correct Answer

verifed

verified

With a procedural language,you must tell...

View Answer

Each job that a user completes,such as filling an order,is called a user task.

A) True
B) False

Correct Answer

verifed

verified

____________________ integrity constraints consist of primary key constraints and foreign key constraints.​

Correct Answer

verifed

verified

____ contain information about table relationships,views,indexes,users,privileges,and replicated data.​


A) ​Biometrics
B) ​Catalogs
C) ​Workgroups
D) ​Journals

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

PC-based DBMSs offer a data dictionary.​

A) True
B) False

Correct Answer

verifed

verified

False

A user's ____________________ specify what kind of access the user has to objects in the database.​

Correct Answer

verifed

verified

permissions​

​____________________ occurs when the DBMS exchanges all updated data between the master database and a replica.

Correct Answer

verifed

verified

​The technique for identifying the person who is attempting to access the DBMS is known as ____.


A) ​encryption
B) ​authentication
C) ​authorization
D) ​viewing

E) All of the above
F) None of the above

Correct Answer

verifed

verified

​____ integrity constraints help to ensure the accuracy and consistency of individual field values.


A) ​Field
B) ​Value
C) ​Key
D) ​Data

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

____________________ are rules that the DBMS must be follow in order to update data accurately and consistently.​

Correct Answer

verifed

verified

​Integrity...

View Answer

____ identify users by physical characteristics such as fingerprints,voiceprints,handwritten signatures,and facial characteristics.​


A) ​Passwords
B) ​Data dictionaries
C) ​Econometrics
D) ​Biometrics

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Explain how a database is updated using batch processing.​

Correct Answer

verifed

verified

When users need to update the database,s...

View Answer

Data about the data in a database is known as ____.​


A) ​backup
B) ​hyperdata
C) ​metadata
D) ​rollback

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

C

The catalog is maintained by ____.​


A) ​the user
B) ​the database administrator
C) ​the author of the tables in the database
D) ​the DBMS

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A DBMS must provide ways to ensure that only authorized users can access the database.

A) True
B) False

Correct Answer

verifed

verified

The successful completion of a transaction is known as an after image.​

A) True
B) False

Correct Answer

verifed

verified

____ denies access by other users to data while the DBMS processes one user's updates to the database.​


A) Batch processing​
B) ​Biometrics
C) ​Journaling
D) ​Locking

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

_________________________ is a property that lets you change the database structure without requiring you to change the programs that access the database.​

Correct Answer

verifed

verified

​____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer