Q.1

The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times.

  • True
  • False
Q.2

Two transactions that run concurrently and generate results that are consistent with the results that would have occurred if they had run separately are referred to as serializable transactions.

  • True
  • False
Q.3

Resource locking is a process to prevent multiple applications from obtaining copies of the same record when the record is about to be changed.

  • True
  • False
Q.4

A phantom read occurs when a transaction rereads data it has previously read and finds modifications or deletions caused by a committed transaction.

  • True
  • False
Q.5

The lost update problem is when User A reads data that have been processed by a portion of a transaction from User B.

  • True
  • False
Q.6

The transaction log contains a copy of every database record (or page) after it has changed. These records are called before images.

  • True
  • False
Q.7

The overall responsibility of the DBA is to facilitate the development and use of the database.

  • True
  • False
Q.8

A transaction is a series of actions to be taken on the database so that either all of them are performed successfully or none of them are performed at all.

  • True
  • False
Q.9

Database administration refers to a function that applies to the entire organization.

  • True
  • False
Q.10

The size of the lock is referred to as the lock granularity.

  • True
  • False
Q.11

A point of synchronization between the database and the transaction log is generally referred to as a stop point.

  • True
  • False
Q.12

Locks placed by command are implicit locks.

  • True
  • False
Q.13

A durable transaction is one in which all committed changes are permanent.

  • True
  • False
Q.14

An ACID transaction is one that is atomic, consistent isolated, and durable.

  • True
  • False
Q.15

An exclusive lock locks the item from change but not from read.

  • True
  • False
0 h : 0 m : 1 s