logo

CuriousTab

CuriousTab

Discussion


Home Database Data and Database Administration Comments

  • Question
  • Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally?


  • Options
  • A. Rollback
  • B. Rollforward
  • C. Switch to duplicate database
  • D. Reprocess transactions

  • Correct Answer
  • Rollback 


  • Data and Database Administration problems


    Search Results


    • 1. Which of the following could cause data to be unavailable?

    • Options
    • A. Data becoming lost or inaccurate
    • B. The database server
    • C. Planned database maintenance activities
    • D. All of the above.
    • Discuss
    • 2. Common Gateway Interface (CGI) is which of the following?

    • Options
    • A. An interface that accepts and returns data that may be written in SQL.
    • B. An interface that accepts and returns data that may be written in any language that produces an executable file.
    • C. A small program that executes within another application and is stored on the server.
    • D. A small program that executes within another application and is stored on the client.
    • Discuss
    • 3. What is Hypertext Transfer Protocol (HTTP)?

    • Options
    • A. The protocol to copy files between computers
    • B. The transfer protocol to transfer Web pages to a browser
    • C. The database access protocol for SQL statements
    • D. The hardware/software protocol that limits access to company data
    • Discuss
    • 4. A proxy server is used for which of the following?

    • Options
    • A. To provide security against unauthorized users
    • B. To process client requests for Web pages
    • C. To process client requests for database access
    • D. To provide TCP/IP
    • Discuss
    • 5. Which of the following is true about ColdFusion Markup Language (CFML)?

    • Options
    • A. It is stored in .asp files.
    • B. It is executed on the client.
    • C. It does not use tags.
    • D. It allows for coding of custom tags in an HTML file.
    • Discuss
    • 6. Which of the following is part of an administrative policy to secure a database?

    • Options
    • A. Authentication policies
    • B. Limiting particular areas within a building to only authorized people
    • C. Ensure appropriate responses rates are in external maintenance agreements
    • D. All of the above.
    • Discuss
    • 7. Performance analysis and tuning is which of the following?

    • Options
    • A. Undertaken one time at the time of a DBMS installation
    • B. Undertaken one time at the time of the implementation of a new application
    • C. Undertaken as an ongoing part of the backup of a database
    • D. Undertaken as an ongoing part of managing a database
    • Discuss
    • 8. Concurrency control is important for which of the following reasons?

    • Options
    • A. To ensure data integrity when updates occur to the database in a multiuser environment
    • B. To ensure data integrity when updates occur to the database in a single-user environment
    • C. To ensure data integrity while reading data occurs to the database in a multiuser environment
    • D. To ensure data integrity while reading data occurs to the database in a single-user environment
    • Discuss
    • 9. Which of the following is the preferred way to recover a database after a system failure?

    • Options
    • A. Rollback
    • B. Rollforward
    • C. Switch to duplicate database
    • D. Reprocess transactions
    • Discuss
    • 10. Which of the following is true concerning open-source DBMS?

    • Options
    • A. Is free or nearly free database software whose source code is publicly available
    • B. Is free or nearly free database software whose source code is not publicly available
    • C. Is not competitive against PC-oriented packages and is fully SQL compliant
    • D. Is competitive against PC-oriented packages and is not fully SQL compliant
    • Discuss


    Comments

    There are no comments.

Enter a new Comment