1. Database is a collection of related data 2. A DBMS must furnish users with ability to store, retrieve and update data in the database 3. A DBMS must include facilities to support the independence of programs from the actual structure of the database

Database Systems: Design, Implementation, & Management
12th Edition
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Carlos Coronel, Steven Morris
Chapter9: Database Design
Section: Chapter Questions
Problem 7P
icon
Related questions
Question
100%

Online Mid-Term Test

 

1. Database is a collection of related data

2. A DBMS must furnish users with ability to store, retrieve and update data in the database

3. A DBMS must include facilities to support the independence of programs from the actual structure of the database

4. Database System is a computer program that interacts with the database by issuing an appropriate request (typically an SQL statement) to the DBMS.

5. Database Application Program is a collection of application programs that interact with the database along with the DBMS and the database itself.

6. A view is essentially some subset of database.

7. High impact of failure is one of the disadvantages of DBMS

8. External view in three-level architecture describes what data is stored in database and relationships among the data.

9. Logical data independence refers to immunity of external schemas to changes in conceptual schema.

10. System catalog is repository of information (metadata) describing the data in the database.

11. Which of the following answers are the advantages of traditional two-tier client-server architecture: (may select more than one answer):

A. wider access to existing databases;

B. increased performance;

C. possible reduction in hardware costs;

D. The server can handle integrity checks

12. Which of the following answers are types of threat to database? (may select more than one answer) A. Theft and Fraud B. Loss of confidentiality C. Loss of privacy D. Loss of availability

13. Which of the following answers are appropriate countermeasures (Computer-based control) used to control threat to database? (may select more than one answer) A. RAID B. Encryption C. Views

D. Awareness

14. Which of the following answer is the THREE (3) closely related DBMS functions that are intended to ensure the database is reliable and remains in a consistent state: A. Transaction support, concurrency control service, recovery service B. Transaction support, authorization service, integrity control C. Recovery service, utility services, concurrency control service D. Transaction support, concurrency control service, utility service

15. _______________________ is an action or series of actions, carried out by a single user or application program, which accesses or changes the content of the database. A. Transaction B. Concurrency control C. Data consistency D. Recovery service

16. If the transaction is complete successfully, it is said to have committed and the database reaches a new consistent state.

17. The objective of a concurrency control protocol is to schedule transaction in such a way as to avoid any interference between them and hence prevent the types of problems.

18. Deadlock detection is one of the general techniques used to handle deadlock.

19. Cardinality is the set of allowable values for one or more attributes.

20. Foreign key is a key that is selected to uniquely identify tuples within the relation.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Database Environment
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781305627482
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781285867168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781305971776
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
MIS
MIS
Computer Science
ISBN:
9781337681919
Author:
BIDGOLI
Publisher:
Cengage