MCQOPTIONS
Saved Bookmarks
This section includes 30 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Incorrect data is easy to detect. |
| A. | 1 |
| B. | |
| Answer» C. | |
| 2. |
Queries that do full table scans should be avoided. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 3. |
Data modeling and database design are key responsibilities of data and data base administration. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 4. |
Mirrored databases are almost always provided in high-availability systems. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 5. |
The restore/rerun technique involves reprocessing the day's transactions up to the point of failure. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 6. |
With concurrent processing involving updates, a database with concurrency control will be compromised due to interference between users. |
| A. | 1 |
| B. | |
| Answer» C. | |
| 7. |
Databases are not the property of a single function or individual within the organization. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 8. |
A disaster recovery plan does not need to include the shipment of database backups to other sites. |
| A. | 1 |
| B. | |
| Answer» C. | |
| 9. |
Concurrency control is important for which of the following reasons? |
| A. | To ensure data integrity when updates occur to the database in a multiuser environment |
| B. | To ensure data integrity when updates occur to the database in a single-user environment |
| C. | To ensure data integrity while reading data occurs to the database in a multiuser environment |
| D. | To ensure data integrity while reading data occurs to the database in a single-user environment |
| Answer» B. To ensure data integrity when updates occur to the database in a single-user environment | |
| 10. |
Information repositories are replacing data dictionaries in many organizations. |
| A. | 1 |
| B. | |
| C. | 1 |
| D. | |
| Answer» B. | |
| 11. |
Failure to control confidentiality may lead to loss of competitiveness. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 12. |
Which of the following could cause data to be unavailable? |
| A. | Data becoming lost or inaccurate |
| B. | The database server |
| C. | Planned database maintenance activities |
| D. | All of the above. |
| Answer» E. | |
| 13. |
The greatest threat to business security is often internal rather than external. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 14. |
Which of the following is the preferred way to recover a database after a system failure? |
| A. | Rollback |
| B. | Rollforward |
| C. | Switch to duplicate database |
| D. | Reprocess transactions |
| Answer» D. Reprocess transactions | |
| 15. |
Performance analysis and tuning is which of the following? |
| A. | Undertaken one time at the time of a DBMS installation |
| B. | Undertaken one time at the time of the implementation of a new application |
| C. | Undertaken as an ongoing part of the backup of a database |
| D. | Undertaken as an ongoing part of managing a database |
| Answer» E. | |
| 16. |
Authorization tables contain highly sensitive data and should be protected by stringent security rules. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 17. |
A data warehouse administrator is concerned with which of the following? |
| A. | The time to make a decision but not the typical roles of a database administrator |
| B. | The time to make a decision and the typical roles of a database administrator |
| C. | The typical roles of a data administrator and redesigning existing applications |
| D. | The typical roles of a database administrator and redesigning existing applications |
| Answer» C. The typical roles of a data administrator and redesigning existing applications | |
| 18. |
Locking may cause which of the following problems? |
| A. | Erroneous updates |
| B. | Deadlock |
| C. | Versioning |
| D. | All of the above. |
| Answer» C. Versioning | |
| 19. |
Which of the following is true concerning open-source DBMS? |
| A. | Is free or nearly free database software whose source code is publicly available |
| B. | Is free or nearly free database software whose source code is not publicly available |
| C. | Is not competitive against PC-oriented packages and is fully SQL compliant |
| D. | Is competitive against PC-oriented packages and is not fully SQL compliant |
| Answer» B. Is free or nearly free database software whose source code is not publicly available | |
| 20. |
A shared lock allows which of the following types of transactions to occur? |
| A. | Delete |
| B. | Insert |
| C. | Read |
| D. | Update |
| Answer» D. Update | |
| 21. |
Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally. |
| A. | 1 |
| B. | |
| C. | 1 |
| D. | |
| Answer» B. | |
| 22. |
A transaction log shows before and after images of records that have been modified by transactions. |
| A. | 1 |
| B. | |
| Answer» C. | |
| 23. |
Which of the following is part of an administrative policy to secure a database? |
| A. | Authentication policies |
| B. | Limiting particular areas within a building to only authorized people |
| C. | Ensure appropriate responses rates are in external maintenance agreements |
| D. | All of the above. |
| Answer» E. | |
| 24. |
Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally? |
| A. | Rollback |
| B. | Rollforward |
| C. | Switch to duplicate database |
| D. | Reprocess transactions |
| Answer» B. Rollforward | |
| 25. |
To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository. |
| A. | 1 |
| B. | |
| C. | 1 |
| D. | |
| Answer» B. | |
| 26. |
The transaction log includes which of the following? |
| A. | The before-image of a record |
| B. | The after-image of a record |
| C. | The before and after-image of a record |
| D. | The essential data of the record |
| Answer» E. | |
| 27. |
A traditional data administrator performs which of the following roles? |
| A. | Tune database performance |
| B. | Establish backup and recovery procedures |
| C. | Resolve data ownership issues |
| D. | Protect the security of the database. |
| Answer» D. Protect the security of the database. | |
| 28. |
If both data and database administration exist in an organization, the database administrator is responsible for which of the following? |
| A. | Data modeling |
| B. | Database design |
| C. | Metadata |
| D. | All of the above. |
| Answer» C. Metadata | |
| 29. |
Backward recovery is which of the following? |
| A. | Where the before-images are applied to the database |
| B. | Where the after-images are applied to the database |
| C. | Where the after-images and before-images are applied to the database |
| D. | Switching to an existing copy of the database |
| Answer» B. Where the after-images are applied to the database | |
| 30. |
Poor data administration can lead to which of the following? |
| A. | A single definition of the same data entity |
| B. | Familiarity with existing data |
| C. | Missing data elements |
| D. | All of the above. |
| Answer» D. All of the above. | |