1. Database is a collection of related data 2. A DBMS must furnish users with ability to store, retrieve and update data in the database 3. A DBMS must include facilities to support the independence of programs from the actual structure of the database

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
100%

Online Mid-Term Test

 

1. Database is a collection of related data

2. A DBMS must furnish users with ability to store, retrieve and update data in the database

3. A DBMS must include facilities to support the independence of programs from the actual structure of the database

4. Database System is a computer program that interacts with the database by issuing an appropriate request (typically an SQL statement) to the DBMS.

5. Database Application Program is a collection of application programs that interact with the database along with the DBMS and the database itself.

6. A view is essentially some subset of database.

7. High impact of failure is one of the disadvantages of DBMS

8. External view in three-level architecture describes what data is stored in database and relationships among the data.

9. Logical data independence refers to immunity of external schemas to changes in conceptual schema.

10. System catalog is repository of information (metadata) describing the data in the database.

11. Which of the following answers are the advantages of traditional two-tier client-server architecture: (may select more than one answer):

A. wider access to existing databases;

B. increased performance;

C. possible reduction in hardware costs;

D. The server can handle integrity checks

12. Which of the following answers are types of threat to database? (may select more than one answer) A. Theft and Fraud B. Loss of confidentiality C. Loss of privacy D. Loss of availability

13. Which of the following answers are appropriate countermeasures (Computer-based control) used to control threat to database? (may select more than one answer) A. RAID B. Encryption C. Views

D. Awareness

14. Which of the following answer is the THREE (3) closely related DBMS functions that are intended to ensure the database is reliable and remains in a consistent state: A. Transaction support, concurrency control service, recovery service B. Transaction support, authorization service, integrity control C. Recovery service, utility services, concurrency control service D. Transaction support, concurrency control service, utility service

15. _______________________ is an action or series of actions, carried out by a single user or application program, which accesses or changes the content of the database. A. Transaction B. Concurrency control C. Data consistency D. Recovery service

16. If the transaction is complete successfully, it is said to have committed and the database reaches a new consistent state.

17. The objective of a concurrency control protocol is to schedule transaction in such a way as to avoid any interference between them and hence prevent the types of problems.

18. Deadlock detection is one of the general techniques used to handle deadlock.

19. Cardinality is the set of allowable values for one or more attributes.

20. Foreign key is a key that is selected to uniquely identify tuples within the relation.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Database Environment
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education