Sail E0 Webinar

MCQs

Total Questions : 30 | Page 2 of 3 pages
Question 11. Which of the following is the preferred way to recover a database after a system failure?
  1.    Reprocess transactions
  2.    Rollforward
  3.    Switch to duplicate database
  4.    Rollback
 Discuss Question
Answer: Option C. -> Switch to duplicate database
Question 12. Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally?
  1.    Reprocess transactions
  2.    Switch to duplicate database
  3.    Rollforward
  4.    Rollback
 Discuss Question
Answer: Option D. -> Rollback
Question 13. Which of the following is true concerning open-source DBMS?
  1.    Is free or nearly free database software whose source code is publicly available
  2.    Is competitive against PC-oriented packages and is not fully SQL compliant
  3.    Is not competitive against PC-oriented packages and is fully SQL compliant
  4.    Is free or nearly free database software whose source code is not publicly available
 Discuss Question
Answer: Option A. -> Is free or nearly free database software whose source code is publicly available
Question 14. A data warehouse administrator is concerned with which of the following?
  1.    The time to make a decision but not the typical roles of a database administrator
  2.    The typical roles of a data administrator and redesigning existing applications
  3.    The time to make a decision and the typical roles of a database administrator
  4.    The typical roles of a database administrator and redesigning existing applications
 Discuss Question
Answer: Option C. -> The time to make a decision and the typical roles of a database administrator
Question 15. Concurrency control is important for which of the following reasons?
  1.    To ensure data integrity when updates occur to the database in a single-user environment
  2.    To ensure data integrity while reading data occurs to the database in a single-user environment
  3.    To ensure data integrity when updates occur to the database in a multiuser environment
  4.    To ensure data integrity while reading data occurs to the database in a multiuser environment
 Discuss Question
Answer: Option C. -> To ensure data integrity when updates occur to the database in a multiuser environment
Question 16. A transaction log shows before and after images of records that have been modified by transactions.
  1.    False
  2.    True
 Discuss Question
Answer: Option A. -> False
Question 17. Authorization tables contain highly sensitive data and should be protected by stringent security rules.
  1.    False
  2.    True
 Discuss Question
Answer: Option B. -> True
Question 18. To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.
  1.    False
  2.    True
 Discuss Question
Answer: Option B. -> True
Question 19. Failure to control confidentiality may lead to loss of competitiveness.
  1.    True
  2.    False
 Discuss Question
Answer: Option A. -> True
Question 20. The greatest threat to business security is often internal rather than external.
  1.    True
  2.    False
 Discuss Question
Answer: Option A. -> True

Latest Videos

Latest Test Papers