CIS 120 - Introduction to Databases » Summer 2021 » Quiz 6

Need help with your exam preparation?

Question #1
In timestamping, DBMS processes updates to a database in timestamp order.
A.   TRUE
B.   FALSE
Question #2
DBMS must provide methods to recover a database in the event the database is damaged.
A.   FALSE
B.   TRUE
Question #3
During deadlock, two or more users are waiting for the other user to release a lock before they can proceed.
A.   TRUE
B.   FALSE
Question #4
DBA should synchronize master database with any replica database constantly because DBMS cannot do it automatically.
A.   FALSE
B.   TRUE
Question #5
A DBMS should manage multiple copies of same data in one central location.
A.   TRUE
B.   FALSE
Question #6
Synchronization means a DBMS exchanges all updated data between master database and any replica.
A.   TRUE
B.   FALSE
Question #7
DBA can create an index for a table at any time by entering a SQL command.
A.   TRUE
B.   FALSE
Question #8
Authorization is to verify that user X is indeed what user X really is.
A.   FALSE
B.   TRUE
Question #9
Data integrity may include data types, legal data values, and data formats.
A.   TRUE
B.   FALSE
Question #10
Key integrity includes foreign key and primary key constraints.
A.   TRUE
B.   FALSE
Question #11
There are some laws and regulations to dictate some privacy rules. Some organizations may institute additional privacy rules.
A.   FALSE
B.   TRUE
Question #12
ACCESS does support VIEWs directly.
A.   FALSE
B.   TRUE
Question #13
In a RDBMS, a view is a snapshot of certain data in the database at a given moment in time.
A.   TRUE
B.   FALSE
Question #14
Authorization is the same as authentication.
A.   FALSE
B.   TRUE
Question #15
A workgroup is a group of users who share the same authorization rules and permissions.
A.   FALSE
B.   TRUE
Question #16
DBA may use some authorization rules to specify which users have what type of access to which data.
A.   TRUE
B.   FALSE
Question #17
Password is one simple and effective way to achieve authentication.
A.   TRUE
B.   FALSE
Question #18
Decrypting is to reverse the encryption so that data is readable to users.
A.   TRUE
B.   FALSE
Question #19
In Access, we cannot encrypt a database with just one password.
A.   FALSE
B.   TRUE
Question #20
Security is to prevent any unauthorized access, either intentional or accidental, to a database.
A.   FALSE
B.   TRUE
Question #21
Most DBMSs provide users with a simple way to make backup copies and to recover the database later by copying the backup over the database.
A.   FALSE
B.   TRUE
Question #22
DBMS must not make backup copies of a database for security or privacy reasons.
A.   TRUE
B.   FALSE
Question #23
Data recovery features not supplied by a DBMS need to be included in its application programs by a DBA.
A.   FALSE
B.   TRUE
Question #24
DBMS backward recovery feature may use the log to apply after images for the problem transactions.
A.   TRUE
B.   FALSE
Question #25
Forward recovery is to undo some problem transactions.
A.   FALSE
B.   TRUE
Question #26
Backward recovery or rollback is to undo some problem transactions.
A.   TRUE
B.   FALSE
Question #27
Backward recovery or rollback is to apply before images from log to undo the updates of some problem transactions.
A.   FALSE
B.   TRUE
Question #28
Forward recovery is to apply after images of committed transactions from log to a database.
A.   TRUE
B.   FALSE
Question #29
A log should be available even if the database is destroyed or damaged.
A.   TRUE
B.   FALSE
Question #30
One simplest way to achieve data recovery is to use backups even though database backups may require more disk and/or tape storage.
A.   FALSE
B.   TRUE
Question #31
To avoid any deadlock situation, we may make and enforce a rule that an application (or user) cannot run until it has locked all the resources it may need.
A.   TRUE
B.   FALSE
Question #32
Journaling is to maintain a journal or log of all database updates in a DBMS.
A.   TRUE
B.   FALSE
Question #33
Backward recovery or rollback is to apply after images from log to undo the updates of some problem transactions.
A.   FALSE
B.   TRUE
Question #34
Encryption converts data to a format indecipherable to other users, and stores it in an encrypted format.
A.   FALSE
B.   TRUE
Question #35
A smart card is a small plastic card with some built-in circuits containing some processing logic to identify the cardholder.
A.   FALSE
B.   TRUE
Question #36
Authentication refers to some techniques to really identify the user who is attempting to access a database in a DBMS.
A.   TRUE
B.   FALSE
Question #37
Authorization is totally different from authentication.
A.   TRUE
B.   FALSE
Question #38
In a RDBMS, VIEWs cannot be used for security purposes.
A.   TRUE
B.   FALSE
Question #39
Most DBMSs do not support VIEWs due to their complexities.
A.   FALSE
B.   TRUE
Question #40
A DBMS should synchronize master database with any replica database constantly.
A.   FALSE
B.   TRUE

Need help with your exam preparation?