1._____ can render data useless to unauthorized users who might have violated some of the database security layers.
The correct answer is: Data encryption
2._____ are required to prevent another transaction form reading inconsistent data.
The correct answer is: Locks
3._____ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
The correct answer is: Isolation
4._____ occurs when a transaction accesses data before and after one or more other transactions finish working with such data.
The correct answer is: Inconsistent retrieval
5._____ requires that all operations of a transaction be completed.
The correct answer is: Atomicity
6.A _____ lock allows concurrent transactions to access different rows of the same table.
The correct answer is: row-level
7.A _____ lock will lock the entire diskpage.
The correct answer is: page-level
8.A _____ lock will lock the entire table, preventing access to any row by a transaction while another transaction is using the table.
The correct answer is: table-level
9.A consistent database state is one in which all _____.
The correct answer is: data integrity constraints are satisfied
10.A diskpage, or page, is the equivalent of a _____.
The correct answer is: diskblock
11.A single-user database system automatically ensures_____ of the database, because only one transaction is executed at a time.
The correct answer is: serializability and isolation
12._____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources.
The correct answer is: Virtualization
13._____ is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance.
The correct answer is: Physical design
14.”Should the existing system be replaced?” is a question that is asked during the _____ stage of the Systems Development Life Cycle (SDLC).
The correct answer is: planning
15.”What are the requirements of the current system’s end users?” is a question asked during the _____ phase of the Systems Development Life Cycle (SDLC).
The correct answer is: analysis
16.Coding, testing, and debugging are part of the _____ phase of the Systems Development Life Cycle (SDLC).
The correct answer is: implementation
17.Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC).
The correct answer is: analysis
18.During decentralized design, after the _____ has been completed, all modules are integrated into one conceptual model.
The correct answer is: verification process
19.During the _____ phase of the Systems Development Life Cycle (SDLC), the hardware, database management system (DBMS) software, and application programs are installed, and the database design is implemented.
The correct answer is: implementation
20.In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up.
The correct answer is: differential backup
Other Links:
See other websites for quiz:
Check on QUIZLET