Professional Documents
Culture Documents
Full download Database Concepts 6th Edition Kroenke Test Bank all chapter 2024 pdf
Full download Database Concepts 6th Edition Kroenke Test Bank all chapter 2024 pdf
Test Bank
Go to download the full and correct content document:
https://testbankfan.com/product/database-concepts-6th-edition-kroenke-test-bank/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
https://testbankfan.com/product/database-concepts-6th-edition-
kroenke-solutions-manual/
https://testbankfan.com/product/database-concepts-8th-edition-
kroenke-test-bank/
https://testbankfan.com/product/database-concepts-7th-edition-
kroenke-test-bank/
https://testbankfan.com/product/database-concepts-7th-edition-
kroenke-solutions-manual/
Database Concepts 8th Edition Kroenke Solutions Manual
https://testbankfan.com/product/database-concepts-8th-edition-
kroenke-solutions-manual/
https://testbankfan.com/product/database-processing-12th-edition-
kroenke-test-bank/
https://testbankfan.com/product/database-system-concepts-6th-
edition-silberschatz-test-bank/
https://testbankfan.com/product/database-system-concepts-6th-
edition-silberschatz-solutions-manual/
https://testbankfan.com/product/database-processing-11th-edition-
kroenke-solutions-manual/
Database Concepts, 6e (Kroenke/Auer)
Chapter 6 Database Administration
3) The purpose of concurrency control is to ensure that one user's work does not inappropriately
influence another user's work.
Answer: TRUE
Diff: 2 Page Ref: 306
4) All actions in an atomic transaction are completed successfully or none of the actions are
completed at all.
Answer: TRUE
Diff: 1 Page Ref: 306
5) A transaction in which all steps must be completed successfully or none of them will be
completed is called a durable transaction.
Answer: FALSE
Diff: 2 Page Ref: 306
6) Concurrent processing of a database only poses problems when two or more processes attempt
to use the same data.
Answer: TRUE
Diff: 3 Page Ref: 306-307
7) A dirty read is a problem with concurrent processing when a transaction rereads data it has
already read and finds modifications or deletions caused by another transaction.
Answer: FALSE
Diff: 3 Page Ref: 309
8) One way to prevent concurrent processing problems is to lock data that are retrieved for
update.
Answer: TRUE
Diff: 1 Page Ref: 309
9) Lock granularity refers to whether a lock is placed by the DBMS automatically or is placed by
a command from the application program.
Answer: FALSE
Diff: 1 Page Ref: 309
1
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
10) Two-phased locking can be used to ensure that transactions are serializable.
Answer: TRUE
Diff: 2 Page Ref: 310
11) With optimistic locking, locks are first issued, then the transaction is processed, and then the
locks are released.
Answer: FALSE
Diff: 3 Page Ref: 311-312
12) One advantage of optimistic locking is that the lock is obtained only after the transaction is
processed.
Answer: TRUE
Diff: 2 Page Ref: 311-312
13) Statement level consistency means that all statements within a transaction will access
consistent rows across the lifetime of the entire transaction.
Answer: FALSE
Diff: 3 Page Ref: 313-314
14) Generally, the more restrictive the transaction isolation level, the less the throughput of
database processing.
Answer: TRUE
Diff: 2 Page Ref: 314
15) Database security is easy to achieve since all security is handled by the DBMS, which is a
single point of entry into the database.
Answer: FALSE
Diff: 2 Page Ref: 317
16) In terms of database security, a user can be assigned many roles, and a role can be assigned
to many users.
Answer: TRUE
Diff: 3 Page Ref: 317-318
17) The simplest and most feasible means of recovering a database is through reprocessing.
Answer: FALSE
Diff: 2 Page Ref: 324
18) In comparison to reprocessing, rollforward does not involve the application programs.
Answer: TRUE
Diff: 3 Page Ref: 324-326
19) Rollback requires the use of logs, but rollforward does not.
Answer: FALSE
Diff: 1 Page Ref: 324-326
2
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
20) Transactions should be written to the log before they are applied to the database itself.
Answer: TRUE
Diff: 2 Page Ref: 324-326
22) Microsoft Access 2010 databases can be secured using trusted locations for database storage.
Answer: TRUE
Diff: 2 Page Ref: 328-331
24) Microsoft Access 2010 databases can be secured by deploying databases packaged with
digital signatures.
Answer: TRUE
Diff: 2 Page Ref: 328
25) When using the Microsoft Access 2010 Security Options dialog box, the default setting in
the dialog box enables some specific capabilities of Access 2010.
Answer: FALSE
Diff: 1 Page Ref: 329-331
3
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
28) The purpose of concurrency control is to:
A) ensure that each form has a corresponding report.
B) ensure that ASPs do not duplicate JSPs.
C) ensure that one user's work does not interfere with another's.
D) ensure that stored procedures do not invoke triggers.
E) ensure that triggers do not invoke stored procedures.
Answer: C
Diff: 1 Page Ref: 306
29) When a transaction functions in such a way that either all of the transaction actions are
completed or none of them will be, the transaction is said to be:
A) consistent.
B) isolated.
C) atomic.
D) locked.
E) logical.
Answer: C
Diff: 2 Page Ref: 306-307
30) What concurrent processing problem occurs when a transaction rereads data and finds new
rows that were inserted by a different transaction since the prior read?
A) Nonrepeatable reads
B) Phantom reads
C) Dirty reads
D) Serialized reads
E) Unlocked reads
Answer: B
Diff: 2 Page Ref: 309
31) What concurrent processing problem occurs when a transaction reads a changed record that
has not been committed to the database?
A) Nonrepeatable reads
B) Phantom reads
C) Dirty reads
D) Serialized reads
E) Unlocked reads
Answer: C
Diff: 2 Page Ref: 309
4
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
32) Preventing multiple applications from obtaining copies of the same record when the record is
about to changed is called:
A) serialized reading.
B) lost updating.
C) concurrent processing.
D) resource locking.
E) block factoring.
Answer: D
Diff: 1 Page Ref: 309
33) Whether a lock applies to data at the record level, page level, table level, or database level is
referred to as:
A) lock exclusivity.
B) lock sharing.
C) lock phasing.
D) serializable locking.
E) lock granularity.
Answer: E
Diff: 2 Page Ref: 309-310
5
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
37) Ensuring that each SQL statement independently processes consistent rows is known as:
A) transaction level consistency.
B) independent consistency.
C) statement level consistency.
D) process level consistency.
E) serializable consistency.
Answer: C
Diff: 2 Page Ref: 313-314
38) What is the least restrictive isolation level that will prevent phantom read problems?
A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read
Answer: B
Diff: 3 Page Ref: 314-315
39) What is the least restrictive isolation level that will prevent dirty reads?
A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read
Answer: A
Diff: 3 Page Ref: 314-315
40) What is the least restrictive isolation level that will prevent nonrepeatable reads?
A) Read Committed
B) Serializable
C) Read Uncommitted
D) Atomic Read
E) Repeatable Read
Answer: E
Diff: 2 Page Ref: 314-315
41) Which of the following is not true of database recovery through reprocessing?
A) Reprocessing makes use of a database save.
B) Reprocessing takes the same amount of time as did processing in the first place.
C) Reprocessing will always return the database to its exact previous state.
D) Reprocessing requires a record of all transactions since the last time the database was saved.
E) All of the above are true of reprocessing.
Answer: C
Diff: 3 Page Ref: 323-326
6
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
42) The recovery technique in which the database is returned to a known state and then all valid
transactions are reapplied to the database is known as:
A) reprocessing.
B) rollback.
C) transaction logging.
D) rollforward.
E) checkpointing.
Answer: D
Diff: 2 Page Ref: 323-326
43) A point of synchronization between the database and the transaction log is called a(n):
A) before-image.
B) after-image.
C) recovery.
D) checkpoint.
E) None of the above
Answer: D
Diff: 2 Page Ref: 323-326
46) When Microsoft Access 2010 secures a database just by storing the database in a trusted
location, the database file will be a(n):
A) *.accdb file.
B) *.accdc file.
C) *.accde file.
D) *.mdb file.
E) *.mdw file.
Answer: A
Diff: 2 Page Ref: 328-335
7
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
47) When Microsoft Access 2010 secures a database with just a password, the database file will
be a(n):
A) *.accdb file.
B) *.accdc file.
C) *.accde file.
D) *.mdb file.
E) *.mdw file.
Answer: A
Diff: 2 Page Ref: 336-341
48) When Microsoft Access 2010 compiles VBA code in a database, the database file will be
a(n):
A) *.accdb file.
B) *.accdc file.
C) *.accde file.
D) *.mdb file.
E) *.mdw file.
Answer: C
Diff: 2 Page Ref: 342-347
49) When Microsoft Access 2010 creates a signed package with a digital signature, the database
file will be a(n):
A) *.accdb file.
B) *.accdc file.
C) *.accde file.
D) *.mdb file.
E) *.mdw file.
Answer: B
Diff: 2 Page Ref: 342-347
50) When Microsoft Access 2010 uses user-level security with an Access 2003 file, the database
is stored in a(n):
A) *.accdb file.
B) *.accdc file.
C) *.accde file.
D) *.mdb file.
E) *.mdw file.
Answer: D
Diff: 2 Page Ref: 347
51) ________ is an important business function whose purpose is to manage the database to
maximize its value to the organization.
Answer: Database administration
Diff: 2 Page Ref: 303-304
8
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
52) One of the major tasks of the database administration is called ________ control, which
allows multiple users to access the database simultaneously.
Answer: concurrency
Diff: 2 Page Ref: 304
53) Database administrators must make sure that ________ measures are in place and enforced
so that only authorized users can take authorized actions at appropriate times.
Answer: security
Diff: 2 Page Ref: 304
54) Database administrators must make sure that ________ and ________ techniques and
procedures are operating to protect the database in case of failure and to recover it as quickly and
accurately as possible when necessary.
Answer: backup; recovery
Diff: 2 Page Ref: 304
55) Serializable transactions are created by having a(n) ________ phase, in which locks are
obtained, and a(n) ________ phase, in which locks are released.
Answer: growing; shrinking
Diff: 3 Page Ref: 310
56) Standard SQL defines four ________, which specify which of the concurrency control
problems are allowed to occur.
Answer: isolation levels
Diff: 2 Page Ref: 314
57) Transaction results are kept in a ________, which contains records of the data changes in
chronological order.
Answer: log
Diff: 1 Page Ref: 323-326
58) The recovery method, where the database is restored using the saved data, and all
transactions since the save are reapplied, is called ________ recovery.
Answer: rollforward
Diff: 2 Page Ref: 323-326
59) The recovery method in which we undo the changes that erroneous or partially processed
transactions have made in the database is called ________ recovery.
Answer: rollback
Diff: 2 Page Ref: 323-326
60) Breaking hardware, power outages, and human mistakes are all reasons that ________.
Answer: computers fail
Diff: 2 Page Ref: 323
9
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
61) When Microsoft Access 2010 uses user-level security with an Access 2003 database file, it
stores the database in a(n) ________ file.
Answer: *.mdb
Diff: 2 Page Ref: 347
62) Microsoft Access 2010 can secure database files by storing them in a(n) ________.
Answer: trusted location
Diff: 2 Page Ref: 329
63) Microsoft Access 2010 can secure databases by using ________ to encrypt and decrypt the
database files.
Answer: passwords
Diff: 3 Page Ref: 336
64) Microsoft Access 2010 can secure databases by deploying databases packaged with a(n)
________.
Answer: digital signature
Diff: 2 Page Ref: 342
65) When Microsoft Access 2010 compiles VBA code in a database, the resulting file is stored
using a(n) ________ file extension.
Answer: *.accde
Diff: 2 Page Ref: 342
66) What database administration functions help bring order to the potential chaos of the
database processing environment?
Answer: First, the actions of concurrent users must be controlled so that consistent results are
obtained. Second, security measures are necessary so that only authentic users who are properly
authorized are permitted to take appropriate actions on databases. Finally, backup and recovery
techniques and procedures must be in place to protect databases and the data they contain.
Diff: 1 Page Ref: 303-304
10
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
68) Briefly define the three problems that can occur because of concurrent processing that are
addressed by resource locking.
Answer: The three problems that can occur because of concurrent processing are dirty reads,
nonrepeatable reads, and phantom reads. A dirty read occurs when a transaction reads a changed
record that has not been committed to the database. If the change is cancelled before it is
committed, then the read will contain incorrect data. A nonrepeatable read occurs when a
transaction rereads data and finds modifications or deletions caused by another transaction. A
phantom read occurs when a transaction rereads data and finds new rows that were inserted by
another transaction since the prior read.
Diff: 2 Page Ref: 309
11
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
73) What is the difference between authentication and authorization?
Answer: Authentication refers to making sure a user has the right to use the computer system in
the first place. It is the precursor to authorization, which is assigning an authenticated user
permission to perform specific tasks on the system. Both are need for effective computer system
security.
Diff: 2 Page Ref: 317
12
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Another random document with
no related content on Scribd:
Salt-marsh seepage. Why, it was like quicksand down below the
solid strata. The words came quick and clear from Melvin thinking.
Solid strata. Even the solid strata wasn't all solid. There were
porosities in it—like a sponge. If something very heavy went down
through the cellar floor it would go right on sinking.
Auxiliary fuels, came from Melvin thinking. They're in the auxiliary
fuel-chamber now. Hot steam in the turbines, pushed right through
the heat exchanger. The atomic charge won't go of at all if the heat
exchanger works fast enough.
They don't know as much about the rocket as Pop does, came from
Melvin. The atomic part is the big important part. They came at night
and studied that. But the heat exchanger—they didn't take the
trouble to study it. Now they're worried about it. Why should an
atomic rocket have auxiliary fuels?
Daddy could have told them. You had to have auxiliary fuels in a
rocket if you were going to send it to the moon. The rocket's
trajectory would have to be modified by small readjustments that
could only be made by auxiliary fuels.
Melvin, think hard! Think hard and fast, and in the right way!
They're stopping now to puzzle it out, came from Melvin. Their minds
work differently from ours. They fasten on the big important things
first. The small things they sometimes overlook. They can't help it.
Their minds are constructed that way.
Mustn't let trivialities distract us. That's what they were thinking.
That's what they were thinking, and they were going to make a
mistake.
They're going to move the wrong dial. I'm going to help them move
the wrong dial. I want them to move the wrong dial. They must move
the wrong dial....
It began with a faint humming sound—nothing more. But something
that couldn't have come from Melvin at all showered Mary Anne's
mind with thoughts and emotions that were like a screaming inside
her head.
A continuous terrified screaming that made her want to slap her
hands to her ears to shut out the sound.
The screaming stopped the instant the rocket began to vibrate. It
stopped as abruptly as a jet of steam issuing from a suddenly
clogged pipe.
The humming changed to a droning and the rocket vibrated so
furiously that Mary Anne grew dizzy just watching it. With the
dizziness came a terrible fear that the rocket would explode. It was
like being bound to a chair, helpless, and knowing you couldn't
possibly escape. She saw herself being blown up with the cottage,
with Melvin screaming for her to save him.
But nothing like that happened. The cottage shook a little. She was
hurled forward, then to her knees. But the blast of heat which fanned
her face was no worse than the blast from a furnace door swinging
quickly open and shut.
Straight down through the floor the rocket sank with its base glowing
white hot. There were a sizzling and a hissing and she could see
flames dancing through the steam which kept rising in clouds until
water gushed up in torrents and put the fire out.
She shut her eyes then and clenched her hands tight.
She sat very still, waiting for Melvin to come to her. She felt a great
and overwhelming need to lean on someone, to be consoled by a
firm masculine voice speaking out bold and clear.
The bursting strangeness was gone from inside her head. She could
move again. She refused to try but she knew that she could
whenever she wanted to. Her thoughts were her own now—not
Melvin's or Tall-Thin's.
She started to cry, very softly, and she was still crying when Melvin
reached her side, helped her to her feet.
"Mary Anne, I could see them moving around inside the rocket. I
could even make them do what I wanted them to do. It happened as
soon as they turned that ray on me. I couldn't move but I knew what
they were thinking."
"So did I, Melvin," Mary Anne sobbed. "I knew what you were
thinking too."
"Yeah. We seemed to be talking together there for a minute. But not
the way we're talking now."
Mary Anne nodded. "I knew what you were thinking and they knew
what we...." Mary Anne stopped. "Melvin! You fooled them! Inside the
ship they didn't hear us talking together. If they had heard us they
would not have made a mistake and turned the wrong dial."
"Yeah, I know. I tried to throw up a mental block when we talked
about the auxiliary fuel-chamber and what would happen if the heat
exchanger worked fast enough. I guess it worked. The mental block,
I mean...."
"You bet it worked, Melvin. You're wonderful, Melvin."
"You didn't think so when you told Pop about the sandwiches."
"I didn't mean to be a nasty, Melvin."
"All right—skip it. Funny thing—I could never read anybody's
thoughts before. It only lasted for a few minutes. I couldn't do it now."
"They must have done something to us, Melvin."
"I'll say they did. What's Pop going to think when he comes down
here tomorrow and sees the rocket gone?"
"I'm afraid he's going to be awfully mad, Melvin."
There is perhaps no more striking illustration of the prophetic faculty
at work in the world than when it appears full-blown in the occasional
understatements of children.
The next morning, Elwood didn't merely hurl the magazine at his
son. He pointed first to the article, tapping furiously with his
forefinger at Melvin's photograph while his breakfast grew cold at his
elbow.
"Melvin, I warned you to keep your hands off that rocket. I warned
you not to touch it or jar it in any way. But you had to putter around
until you did something to the heat exchanger dial. It's conduct like
that which makes me realize how mistaken these journalist monkeys
can be. A genius! You're no more of a genius—"
"Pop, you've got to believe me!" Melvin protested. "The little men are
—"
"Little men! My son is not only a genius"—Elwood stressed the word
with a biting sarcasm which was not lost on Melvin—"but a first-class
liar! Here, read this article again. It was published two months ago—
but I guess you didn't read it over often enough. It may shame you
into going into a corner and giving yourself a thorough mental
overhauling."
Updated editions will replace the previous one—the old editions will
be renamed.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.