Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Design
Q:
OLE DB objects are COM objects.
Q:
In general, the best type of ODBC data source to define for a Web application is a system data source.
Q:
With ODBC, a file data source is available only to the user that created it.
Q:
A multiple-tier ODBC driver may reformat an SQL request, but it does not actually process the SQL statement.
Q:
In ODBC, the amount of work that the driver must do is largely determined by the degree of SQL-compliance of the data source.
Q:
With ODBC, only a single driver is needed to handle all data source types, such as Oracle, DB2, and Access.
Q:
With ODBC, the driver manager serves as an intermediary between the application and the DBMS drivers.
Q:
With ODBC, a database and the DBMS that processes it are identified by the data source.
Q:
OLE DB can act as a wrapper for (covers) database native libraries so that the functionality can be provided by OLE.
Q:
ODBC works with table-like data sources such as relational databases and spreadsheets.
Q:
ODBC has not had practical success, but has shown great potential for future development.
Q:
If the Web server and the DBMS are running on the same server, the system has a three-tier architecture.
Q:
The most widely used Web server for all operating systems is Internet Information Services (IIS).
Q:
If a server is using a Microsoft Windows operating system, it is usually running Internet Information Server (IIS) as its Web server.
Q:
ODBC stands for Open Database Connectivity.
Q:
Every DBMS product uses the same API.
Q:
Every DBMS product has an application programming interface (API).
Q:
Give an example of how XML can be used with a DBMS.
Q:
Briefly describe NetBeans.
Q:
Briefly describe PHP.
Q:
Explain the process by which JSP pages are compiled.
Q:
Compare and contrast servlets and applets.
Q:
Distinguish among the four types of JDBC drivers.
Q:
What is ADO.NET and what is an ADO.NET DataSet?
Q:
Why is the decomposition of the features and functions of a DBMS into different objects an advantage for OLE DB?
Q:
What are the different types of conformance levels within the ODBC standard, and why do they exist?
Q:
Briefly describe the components of the ODBC architecture.
Q:
Explain the relationships among native DBMS libraries, ODBC, OLE DB, ADO, and ADO.NET and why each led to the development of the next.
Q:
The SQL Server statement
SELECT *
FROM Table01
FOR XML RAW
tells SQL Server to place the data values from the columns in the table into XML ________.
A) elements
B) attributes
C) elements or attributes, as chosen by SQL Server
D) elements or attributes, as designated by the XML Schema
Q:
Which of the following is not true about XML?
A) It is a subset of SGML.
B) Additional standards and capabilities have been added to XML processing.
C) It is a hybrid of document processing and database processing.
D) It is a subset of HTML.
Q:
HTML is an application of ________.
A) SGML
B) XML
C) SOAP
D) XSLT
Q:
PDO stands for ________.
A) PHP Data Objects
B) PHP Design Objects
C) Personal Data Objects
D) Personal Design Objects
Q:
The final step of using a PHP connection to a DBMS is to ________.
A) open the connection
B) test the connection
C) close the connection
D) process the query results
Q:
The first PHP element to be created is the ________.
A) Command object
B) Connection object
C) Errors collection
D) Parameters collection
Q:
In PHP, any programming language statements that are to be processed on the server must be enclosed in ________.
A) <!-- and --!>
B) [php and php]
C) (php and php)
D) <?php and ?>
Q:
As compared to CGI files, JSP pages ________.
A) are less memory efficient
B) require more processor time
C) execute faster
D) keep more copies of a given page in memory
Q:
JSP pages ________.
A) are automatically compiled by the servlet processor as needed
B) are required to be compiled by the developer before being made public
C) are automatically checked for syntax errors by the servlet as they are written
D) uses more memory than CGI files
Q:
Which of the following is not true about Tomcat?
A) It is a servlet processor.
B) It can be used as a standalone Web server.
C) It is often used in conjunction with Apache.
D) It is an applet processor.
Q:
Which of the following is true about JSP code?
A) It must be written in Java or JavaScript.
B) It does not have access to HTTP functionality.
C) It must be coded as complete Java classes and methods.
D) It is automatically converted into Java servlets.
Q:
Explain the purpose of transaction logs and checkpoints.
Q:
Discuss the DBMS security model.
Q:
Distinguish between the four cursor types.
Q:
Which are more commonly used: implicit or explicit locks? Why?
Q:
Explain the process of using optimistic locking.
Q:
Briefly define the four isolation levels and the problems they prevent.
Q:
Briefly define the three problems that can occur because of concurrent processing that are addressed by resource locking.
Q:
Distinguish between statement-level consistency and transaction-level consistency.
Q:
Explain the concept of an atomic transaction.
Q:
Briefly explain the strategy of two-phased locking.
Q:
Explain the concept of serializable transactions.
Q:
Explain the importance of documenting changes in database structure.
Q:
Which type of data repository is composed of metadata that is created automatically as the system components are created?
A) Passive
B) Dynamic
C) Active
D) Automatic
Q:
Which of the following is not true of data repositories?
A) They are usually created after the database has been implemented and optimized for performance.
B) They may be virtual.
C) They may contain metadata about database applications.
D) They may contain metadata about users.
Q:
Which of the following would a DBA typically NOT do in managing the DBMS?
A) Analyze system performance statistics
B) Install new versions of the operating system, as needed
C) Evaluate new DBMS product features
D) Tune DBMS product options to accommodate other software in use
Q:
Which of the following would not be contained in a transaction log?
A) Before images
B) Type of operation
C) Time of the action
D) Permissions
Q:
Recovering a database via rollback involves ________.
A) restoring the database from the save and reprocessing all the transactions since the save
B) restoring the database from the save and reapplying all the changes made by transactions since the save
C) undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure
D) re-creating the database by re-entering all of the data from the beginning and, then reprocessing all of the transactions
Q:
Recovering a database via rollforward involves ________.
A) restoring the database from the save and reprocessing all the transactions since the save
B) restoring the database from the save and reapplying all the changes made by transactions since the save
C) undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure
D) re-creating the database by re-entering all of the data from the beginning, and then reprocessing all of the transactions
Q:
Recovering a database via reprocessing involves ________.
A) restoring the database from the save and reprocessing all the transactions since the save
B) restoring the database from the save and reapplying all the changes made by transactions since the save
C) undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure
D) recreating the database by reentering all of the data from the beginning, and then reprocessing all of the transactions
Q:
Which of the following is not true of DBMS security features?
A) Users may be assigned to one or more roles.
B) A role may be assigned to only one user.
C) Both users and roles can have many permissions.
D) Objects have many permissions.
Q:
Once processing rights have been defined, they may be implemented at any of these levels except ________.
A) network
B) operating system
C) data
D) application
Q:
Which of the following cannot be enforced in the DBMS or application programs?
A) Processing rights
B) Security
C) Processing responsibilities
D) Cursors
E) Transaction isolation
Q:
Which of the following is true of forward only cursors?
A) Current values for each row are retrieved when the application accesses a row.
B) All changes of any type from any source are visible.
C) Changes made by the transaction are visible only if they occur on rows ahead of the cursor.
D) It requires the greatest overhead of any cursor type.
Q:
Which of the following is allowed by "Repeatable Read Isolation"?
A) Nonrepeatable reads
B) Dirty reads
C) Phantom reads
D) Both A and B are correct
Q:
When a transaction rereads data that has been changed and finds changes due to committed transactions, this is known as a ________.
A) Clean read
B) Dirty read
C) Nonrepeatable read
D) Phantom read
Q:
When a transaction reads a row that has been changed, but the change has not been committed, this is known as a ________.
A) Clean read
B) Dirty read
C) Nonrepeatable read
D) Phantom read
Q:
Ensuring that all rows impacted by the actions of a transaction are protected from changes until the entire transaction is completed is called ________.
A) statement level consistency
B) optimistic locking
C) transaction level consistency
D) durable transactions
Q:
Locks that are placed assuming that a conflict will not occur are called ________.
A) dynamic
B) shared
C) pessimistic
D) optimistic
Q:
Locks that are placed assuming that a conflict will occur are called ________.
A) explicit locks
B) implicit locks
C) optimistic locks
D) pessimistic locks
Q:
Requiring all application programs to lock resources in the same order is a technique for preventing what problem?
A) Concurrent update
B) Lost update
C) Deadlock
D) Exclusive locks
Q:
The situation that occurs when two users are each waiting for a resource that the other person has locked is known as a(n) ________.
A) lost update problem
B) deadlock
C) inconsistent read problem
D) checkpoint
Q:
Which of the following is not true about two-phased locking?
A) Cannot obtain a new lock once a lock has been released
B) Uses only shared locks
C) Has a growing phase
D) Has a shrinking phase
Q:
Which type of lock still allows other transactions to have read-only access to the locked resource?
A) Exclusive lock
B) Shared lock
C) Explicit lock
D) Implicit lock
Q:
Which type of lock prevents all types of access to the locked resource?
A) Exclusive lock
B) Shared lock
C) Explicit lock
D) Implicit lock
Q:
Which of the following is not true about locks?
A) Locks with large granularity are easier for the DBMS to administer.
B) Locks with small granularity cause more conflicts.
C) Locks may have a database-level granularity.
D) Locks may have a table-level granularity.
Q:
A lock placed automatically by the DBMS is called a(n) ________ lock.
A) exclusive
B) explicit
C) shared
D) implicit
Q:
One remedy for the inconsistencies caused by concurrent processing is ________.
A) concurrency
B) checkpointing
C) rollback
D) resource locking
Q:
The situation that occurs when one user's changes to the database are lost by a second user's changes to the database is known as the ________.
A) lost update problem
B) deadly embrace problem
C) inconsistent read problem
D) inconsistent write problem
Q:
When two transactions are being processed against the database at the same time ________.
A) they are called concurrent transactions
B) they are usually interleaved
C) they always result in a lost update problem
D) Both A and B are correct
Q:
A series of actions to be taken on the database such that either all actions are completed successfully, or none of them can be completed, is known as a ________.
A) checkpoint
B) log
C) lock
D) transaction
Q:
Measures that are taken to prevent one user's work from inappropriately influencing another user's work are called ________.
A) concurrency control
B) checkpoint
C) database recovery
D) database logging