Data and Database Administration The transaction log includes which of the following? The before-image of a record The essential data of the record The after-image of a record The before and after-image of a record The before-image of a record The essential data of the record The after-image of a record The before and after-image of a record ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Which of the following is true concerning open-source DBMS? Is not competitive against PC-oriented packages and is fully SQL compliant Is free or nearly free database software whose source code is publicly available Is free or nearly free database software whose source code is not publicly available Is competitive against PC-oriented packages and is not fully SQL compliant Is not competitive against PC-oriented packages and is fully SQL compliant Is free or nearly free database software whose source code is publicly available Is free or nearly free database software whose source code is not publicly available Is competitive against PC-oriented packages and is not fully SQL compliant ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Which of the following is the preferred way to recover a database after a system failure? Switch to duplicate database Rollforward Rollback Reprocess transactions Switch to duplicate database Rollforward Rollback Reprocess transactions ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration The greatest threat to business security is often internal rather than external. True False True False ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration A shared lock allows which of the following types of transactions to occur? Delete Read Insert Update Delete Read Insert Update ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Concurrency control is important for which of the following reasons? To ensure data integrity when updates occur to the database in a single-user environment To ensure data integrity while reading data occurs to the database in a multiuser environment To ensure data integrity when updates occur to the database in a multiuser environment To ensure data integrity while reading data occurs to the database in a single-user environment To ensure data integrity when updates occur to the database in a single-user environment To ensure data integrity while reading data occurs to the database in a multiuser environment To ensure data integrity when updates occur to the database in a multiuser environment To ensure data integrity while reading data occurs to the database in a single-user environment ANSWER DOWNLOAD EXAMIANS APP