CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Database
‣
Data and Database Administration
Comments
Question
A transaction log shows before and after images of records that have been modified by transactions.
Options
A. True
B. False
Correct Answer
False
Data and Database Administration problems
Search Results
1. Failure to control confidentiality may lead to loss of competitiveness.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: True
2. Data modeling and database design are key responsibilities of data and data base administration.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: True
3. To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: True
4. The restore/rerun technique involves reprocessing the day's transactions up to the point of failure.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: True
5. Authorization tables contain highly sensitive data and should be protected by stringent security rules.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: True
6. A disaster recovery plan does not need to include the shipment of database backups to other sites.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: False
7. The greatest threat to business security is often internal rather than external.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: True
8. Multiple inheritance allows a class to inherit features from more than one superclass.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: True
9. Composition does not allow an object to be part of more than one aggregate object.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: True
10. A method defines the form or protocol of the operation, but not its implementation.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: False
Comments
There are no comments.
Enter a new Comment
Save
More in Database:
Advanced SQL
Data and Database Administration
Data Modeling with ER Model
Data Models into Database Designs
Data Warehousing
Database Design Using Normalization
Database Processing for BIS
Database Redesign
Distributed Databases
ER Model and Business Rules
Introduction to Database
Introduction to SQL
JDBC, Java Server Pages, and MySQL
Logical Database Design
Managing Databases with Oracle
Managing Multiuser Databases
Modeling Data in the Organization
Object-Oriented Data Modeling
Object-Oriented Database
ODBC, OLE DB, ADO, and ASP
Physical Database Design
SQL for Database Construction
SQL Server 2000
The Client-Server Database
The Database Development Process
The Database Environment
The Internet Database Environment
The Relational Model and Normalization
XML and ADO.NET