Filters
Question type

A configuration of several computers connected together that allow users to share a variety of hardware and software resources is known as a(n)_________________________.​

Correct Answer

verifed

verified

LAN
LAN (local area ...

View Answer

In order to develop new programs,the programmers need access to the information in the DBMS.They are given access to the ____.​


A) ​production system
B) ​test system
C) ​live system
D) ​documentation system

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

​If a DBMS lacks essential security features,the _________________________ might create or purchase special security programs that provide the missing features.

Correct Answer

verifed

verified

DBA
DBA (database ad...

View Answer

What is the DBA's role with regard to access privileges?​

Correct Answer

verifed

verified

The DBA determines the access privileges...

View Answer

In most cases,access to every table and field in a database is a necessity for every user.​

A) True
B) False

Correct Answer

verifed

verified

The _________________________ strictly controls the production system.​

Correct Answer

verifed

verified

DBA
DBA (database ad...

View Answer

A shared lock permits other users to read the data in the database.​

A) True
B) False

Correct Answer

verifed

verified

​____ locks forbid any other user from accessing the data in any way.


A) ​Shared
B) ​Exclusive
C) ​Limited
D) ​Concurrent

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

The DBA is responsible for DBMS maintenance,data dictionary management,and training.​

A) True
B) False

Correct Answer

verifed

verified

By default,Access and other DBMSs create indexes automatically for the ____ keys.​


A) ​primary and minor
B) ​alternate and foreign
C) ​secondary and alternate
D) ​primary and foreign

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

When the primary key cannot be null,this is known as ____________________.​

Correct Answer

verifed

verified

Damage to a database can occur through a physical incident such as an abnormally terminated program.​

A) True
B) False

Correct Answer

verifed

verified

The hardware,software,and database for the users is called the ____________________ system.​

Correct Answer

verifed

verified

production
live
live...

View Answer

The ____ is responsible for providing training in the use of the DBMS.​


A) programmer​
B) ​analyst
C) ​DBA
D) ​CEO

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

With just two exceptions,the DBA grants access and update privileges to the production system only to authorized users.What are the exceptions?​

Correct Answer

verifed

verified

The first exception is when problems occ...

View Answer

An internal company network that uses software tools typically used on the Internet and World Wide Web is called an extranet.​

A) True
B) False

Correct Answer

verifed

verified

Tables with indexes allow faster searches,but slow performance on ____.​


A) ​insertions
B) ​deletions
C) ​updates
D) ​selects

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

SQL is an example of a nonprocedural language.​

A) True
B) False

Correct Answer

verifed

verified

QBE is an example of a procedural language.​

A) True
B) False

Correct Answer

verifed

verified

To implement and enforce security,the DBA uses such features as encryption and views.​

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer