Data and Database Administration A transaction log shows before and after images of records that have been modified by transactions. True False True False ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Authorization tables contain highly sensitive data and should be protected by stringent security rules. True False True False ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally? Reprocess transactions Switch to duplicate database Rollback Rollforward Reprocess transactions Switch to duplicate database Rollback Rollforward ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration With concurrent processing involving updates, a database with concurrency control will be compromised due to interference between users. True False True False ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Performance analysis and tuning is which of the following? Undertaken as an ongoing part of managing a database Undertaken as an ongoing part of the backup of a database Undertaken one time at the time of the implementation of a new application Undertaken one time at the time of a DBMS installation Undertaken as an ongoing part of managing a database Undertaken as an ongoing part of the backup of a database Undertaken one time at the time of the implementation of a new application Undertaken one time at the time of a DBMS installation ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Which of the following is the preferred way to recover a database after a system failure? Switch to duplicate database Reprocess transactions Rollforward Rollback Switch to duplicate database Reprocess transactions Rollforward Rollback ANSWER DOWNLOAD EXAMIANS APP