 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 31 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Incorrect data is easy to detect.%! | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 2. | The restore/rerun technique involves reprocessing the day's transactions up to the point of failure.%! | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 3. | The greatest threat to business security is often internal rather than external.%! | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 4. | Data modeling and database design are key responsibilities of data and data base administration.%! | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 5. | Queries that do full table scans should be avoided.%! | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 6. | A transaction log shows before and after images of records that have been modified by transactions.%! | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 7. | With concurrent processing involving updates, a database with concurrency control will be compromised due to interference between users.%! | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 8. | Databases are not the property of a single function or individual within the organization.%! | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 9. | Authorization tables contain highly sensitive data and should be protected by stringent security rules.%! | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 10. | A disaster recovery plan does not need to include the shipment of database backups to other sites.%! | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 11. | Mirrored databases are almost always provided in high-availability systems.%! | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 12. | Failure to control confidentiality may lead to loss of competitiveness.%! | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 13. | Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally.%! | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 14. | Information repositories are replacing data dictionaries in many organizations.%! | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 15. | To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.%! | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 16. | Performance analysis and tuning is which of the following?%! | 
| A. | Undertaken one time at the time of a DBMS installation | 
| B. | Undertaken one time at the time of the implementation of a new application | 
| C. | Undertaken as an ongoing part of the backup of a database | 
| D. | Undertaken as an ongoing part of managing a database | 
| Answer» E. | |
| 17. | A data warehouse administrator is concerned with which of the following?%! | 
| A. | The time to make a decision but not the typical roles of a database administrator | 
| B. | The time to make a decision and the typical roles of a database administrator | 
| C. | The typical roles of a data administrator and redesigning existing applications | 
| D. | The typical roles of a database administrator and redesigning existing applications | 
| Answer» C. The typical roles of a data administrator and redesigning existing applications | |
| 18. | *$_Backward recovery is which of the following?? | 
| A. | Where the before-images are applied to the database | 
| B. | Where the after-images are applied to the database | 
| C. | Where the after-images and before-images are applied to the database | 
| D. | Switching to an existing copy of the database | 
| Answer» B. Where the after-images are applied to the database | |
| 19. | */*_A data warehouse administrator is concerned with which of the following?? | 
| A. | The time to make a decision but not the typical roles of a database administrator | 
| B. | The time to make a decision and the typical roles of a database administrator | 
| C. | The typical roles of a data administrator and redesigning existing applications | 
| D. | The typical roles of a database administrator and redesigning existing applications | 
| Answer» C. The typical roles of a data administrator and redesigning existing applications | |
| 20. | */*_Performance analysis and tuning is which of the following?? | 
| A. | Undertaken one time at the time of a DBMS installation | 
| B. | Undertaken one time at the time of the implementation of a new application | 
| C. | Undertaken as an ongoing part of the backup of a database | 
| D. | Undertaken as an ongoing part of managing a database | 
| Answer» E. | |
| 21. | _ Which of the following is part of an administrative policy to secure a database?$? | 
| A. | Authentication policies | 
| B. | Limiting particular areas within a building to only authorized people | 
| C. | Ensure appropriate responses rates are in external maintenance agreements | 
| D. | All of the above | 
| Answer» E. | |
| 22. | _ Which of the following is the preferred way to recover a database after a system failure?$? | 
| A. | Rollback | 
| B. | Rollforward | 
| C. | Switch to duplicate database | 
| D. | Reprocess transactions | 
| Answer» D. Reprocess transactions | |
| 23. | _ Locking may cause which of the following problems?$? | 
| A. | Erroneous updates | 
| B. | Deadlock | 
| C. | Versioning | 
| D. | All of the above | 
| Answer» C. Versioning | |
| 24. | _If both data and database administration exist in an organization, the database administrator is responsible for which of the following?$? | 
| A. | Data modeling | 
| B. | Database design | 
| C. | Metadata | 
| D. | All of the above | 
| Answer» C. Metadata | |
| 25. | _Concurrency control is important for which of the following reasons?$? | 
| A. | To ensure data integrity when updates occur to the database in a multiuser environment | 
| B. | To ensure data integrity when updates occur to the database in a single-user environment | 
| C. | To ensure data integrity while reading data occurs to the database in a multiuser environment | 
| D. | To ensure data integrity while reading data occurs to the database in a single-user environment | 
| Answer» B. To ensure data integrity when updates occur to the database in a single-user environment | |
| 26. | _A shared lock allows which of the following types of transactions to occur?$? | 
| A. | Delete | 
| B. | Insert | 
| C. | Read | 
| D. | Update | 
| Answer» D. Update | |
| 27. | Which of the following could cause data to be unavailable?$? | 
| A. | Data becoming lost or inaccurate | 
| B. | The database server | 
| C. | Planned database maintenance activities | 
| D. | All of the above | 
| Answer» E. | |
| 28. | Which of the following is true concerning open-source DBMS?$? | 
| A. | Is free or nearly free database software whose source code is publicly available | 
| B. | Is free or nearly free database software whose source code is not publicly available | 
| C. | Is not competitive against PC-oriented packages and is fully SQL compliant | 
| D. | Is competitive against PC-oriented packages and is not fully SQL compliant | 
| Answer» B. Is free or nearly free database software whose source code is not publicly available | |
| 29. | A traditional data administrator performs which of the following roles?? | 
| A. | Tune database performance | 
| B. | Establish backup and recovery procedures | 
| C. | Resolve data ownership issues | 
| D. | Protect the security of the database | 
| Answer» D. Protect the security of the database | |
| 30. | Which of the following is true concerning open-source DBMS?? | 
| A. | Is free or nearly free database software whose source code is publicly available | 
| B. | Is free or nearly free database software whose source code is not publicly available | 
| C. | Is not competitive against PC-oriented packages and is fully SQL compliant | 
| D. | Is competitive against PC-oriented packages and is not fully SQL compliant | 
| Answer» B. Is free or nearly free database software whose source code is not publicly available | |
| 31. | Which of the following could cause data to be unavailable?? | 
| A. | Data becoming lost or inaccurate | 
| B. | The database server | 
| C. | Planned database maintenance activities | 
| D. | All of the above | 
| Answer» E. | |