The restore/rerun technique involves reprocessing the day's transactions up to the point of failure. False True TRUE ANSWER : ? YOUR ANSWER : ?
Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally? Rollback Reprocess transactions Switch to duplicate database Rollforward TRUE ANSWER : ? YOUR ANSWER : ?
The transaction log includes which of the following? The before and after-image of a record The before-image of a record The essential data of the record The after-image of a record TRUE ANSWER : ? YOUR ANSWER : ?
Locking may cause which of the following problems? Versioning All of these Erroneous updates Deadlock TRUE ANSWER : ? YOUR ANSWER : ?
The greatest threat to business security is often internal rather than external. False True TRUE ANSWER : ? YOUR ANSWER : ?
Which of the following is part of an administrative policy to secure a database? Limiting particular areas within a building to only authorized people Authentication policies All of these Ensure appropriate responses rates are in external maintenance agreements TRUE ANSWER : ? YOUR ANSWER : ?
Authorization tables contain highly sensitive data and should be protected by stringent security rules. False True TRUE ANSWER : ? YOUR ANSWER : ?
Concurrency control is important for which of the following reasons? To ensure data integrity while reading data occurs to the database in a single-user environment To ensure data integrity when updates occur to the database in a multiuser environment To ensure data integrity when updates occur to the database in a single-user environment To ensure data integrity while reading data occurs to the database in a multiuser environment TRUE ANSWER : ? YOUR ANSWER : ?