CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Database
‣
Data and Database Administration
Comments
Question
Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally?
Options
A. Rollback
B. Rollforward
C. Switch to duplicate database
D. Reprocess transactions
Correct Answer
Rollback
Data and Database Administration problems
Search Results
1. Which of the following could cause data to be unavailable?
Options
A. Data becoming lost or inaccurate
B. The database server
C. Planned database maintenance activities
D. All of the above.
Show Answer
Scratch Pad
Discuss
Correct Answer: All of the above.
2. Common Gateway Interface (CGI) is which of the following?
Options
A. An interface that accepts and returns data that may be written in SQL.
B. An interface that accepts and returns data that may be written in any language that produces an executable file.
C. A small program that executes within another application and is stored on the server.
D. A small program that executes within another application and is stored on the client.
Show Answer
Scratch Pad
Discuss
Correct Answer: An interface that accepts and returns data that may be written in any language that produces an executable file.
3. What is Hypertext Transfer Protocol (HTTP)?
Options
A. The protocol to copy files between computers
B. The transfer protocol to transfer Web pages to a browser
C. The database access protocol for SQL statements
D. The hardware/software protocol that limits access to company data
Show Answer
Scratch Pad
Discuss
Correct Answer: The transfer protocol to transfer Web pages to a browser
4. A proxy server is used for which of the following?
Options
A. To provide security against unauthorized users
B. To process client requests for Web pages
C. To process client requests for database access
D. To provide TCP/IP
Show Answer
Scratch Pad
Discuss
Correct Answer: To provide security against unauthorized users
5. Which of the following is true about ColdFusion Markup Language (CFML)?
Options
A. It is stored in .asp files.
B. It is executed on the client.
C. It does not use tags.
D. It allows for coding of custom tags in an HTML file.
Show Answer
Scratch Pad
Discuss
Correct Answer: It allows for coding of custom tags in an HTML file.
6. Which of the following is part of an administrative policy to secure a database?
Options
A. Authentication policies
B. Limiting particular areas within a building to only authorized people
C. Ensure appropriate responses rates are in external maintenance agreements
D. All of the above.
Show Answer
Scratch Pad
Discuss
Correct Answer: All of the above.
7. Performance analysis and tuning is which of the following?
Options
A. Undertaken one time at the time of a DBMS installation
B. Undertaken one time at the time of the implementation of a new application
C. Undertaken as an ongoing part of the backup of a database
D. Undertaken as an ongoing part of managing a database
Show Answer
Scratch Pad
Discuss
Correct Answer: Undertaken as an ongoing part of managing a database
8. Concurrency control is important for which of the following reasons?
Options
A. To ensure data integrity when updates occur to the database in a multiuser environment
B. To ensure data integrity when updates occur to the database in a single-user environment
C. To ensure data integrity while reading data occurs to the database in a multiuser environment
D. To ensure data integrity while reading data occurs to the database in a single-user environment
Show Answer
Scratch Pad
Discuss
Correct Answer: To ensure data integrity when updates occur to the database in a multiuser environment
9. Which of the following is the preferred way to recover a database after a system failure?
Options
A. Rollback
B. Rollforward
C. Switch to duplicate database
D. Reprocess transactions
Show Answer
Scratch Pad
Discuss
Correct Answer: Switch to duplicate database
10. Which of the following is true concerning open-source DBMS?
Options
A. Is free or nearly free database software whose source code is publicly available
B. Is free or nearly free database software whose source code is not publicly available
C. Is not competitive against PC-oriented packages and is fully SQL compliant
D. Is competitive against PC-oriented packages and is not fully SQL compliant
Show Answer
Scratch Pad
Discuss
Correct Answer: Is free or nearly free database software whose source code is publicly available
Comments
There are no comments.
Enter a new Comment
Save
More in Database:
Advanced SQL
Data and Database Administration
Data Modeling with ER Model
Data Models into Database Designs
Data Warehousing
Database Design Using Normalization
Database Processing for BIS
Database Redesign
Distributed Databases
ER Model and Business Rules
Introduction to Database
Introduction to SQL
JDBC, Java Server Pages, and MySQL
Logical Database Design
Managing Databases with Oracle
Managing Multiuser Databases
Modeling Data in the Organization
Object-Oriented Data Modeling
Object-Oriented Database
ODBC, OLE DB, ADO, and ASP
Physical Database Design
SQL for Database Construction
SQL Server 2000
The Client-Server Database
The Database Development Process
The Database Environment
The Internet Database Environment
The Relational Model and Normalization
XML and ADO.NET