INF503 Week 5 Quize’s

1._____ can render data useless to unauthorized users who might have violated some of the database security layers.
The correct answer is: Data encryption

2._____ are required to prevent another transaction form reading inconsistent data.
The correct answer is: Locks

3._____ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
The correct answer is: Isolation

4._____ occurs when a transaction accesses data before and after one or more other transactions finish working with such data. 
The correct answer is: Inconsistent retrieval 

5._____ requires that all operations of a transaction be completed.
The correct answer is: Atomicity

6.A _____ lock allows concurrent transactions to access different rows of the same table.
The correct answer is: row-level

7.A _____ lock will lock the entire diskpage.
The correct answer is: page-level

8.A _____ lock will lock the entire table, preventing access to any row by a transaction while another transaction is using the table.
The correct answer is: table-level

9.A consistent database state is one in which all _____.
The correct answer is: data integrity constraints are satisfied

10.A diskpage, or page, is the equivalent of a _____.
The correct answer is: diskblock

11.A single-user database system automatically ensures_____ of the database, because only one transaction is executed at a time.
The correct answer is: serializability and isolation

12._____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources. 
The correct answer is: Virtualization

13._____ is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance. 
The correct answer is: Physical design

14.”Should the existing system be replaced?” is a question that is asked during the _____ stage of the Systems Development Life Cycle (SDLC).
The correct answer is: planning

15.”What are the requirements of the current system’s end users?” is a question asked during the _____ phase of the Systems Development Life Cycle (SDLC).
The correct answer is: analysis

16.Coding, testing, and debugging are part of the _____ phase of the Systems Development Life Cycle (SDLC).
The correct answer is: implementation

17.Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC).
The correct answer is: analysis

18.During decentralized design, after the _____ has been completed, all modules are integrated into one conceptual model.
The correct answer is: verification process

19.During the _____ phase of the Systems Development Life Cycle (SDLC), the hardware, database management system (DBMS) software, and application programs are installed, and the database design is implemented.
The correct answer is:  implementation

20.In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up.
The correct answer is: differential backup

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG


Leave a Reply

Your email address will not be published. Required fields are marked *