 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 30 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Incorrect data is easy to detect. | 
| A. | 1 | 
| B. | |
| Answer» C. | |
| 2. | Queries that do full table scans should be avoided. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 3. | Data modeling and database design are key responsibilities of data and data base administration. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 4. | Mirrored databases are almost always provided in high-availability systems. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 5. | The restore/rerun technique involves reprocessing the day's transactions up to the point of failure. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 6. | With concurrent processing involving updates, a database with concurrency control will be compromised due to interference between users. | 
| A. | 1 | 
| B. | |
| Answer» C. | |
| 7. | Databases are not the property of a single function or individual within the organization. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 8. | A disaster recovery plan does not need to include the shipment of database backups to other sites. | 
| A. | 1 | 
| B. | |
| Answer» C. | |
| 9. | Concurrency control is important for which of the following reasons? | 
| A. | To ensure data integrity when updates occur to the database in a multiuser environment | 
| B. | To ensure data integrity when updates occur to the database in a single-user environment | 
| C. | To ensure data integrity while reading data occurs to the database in a multiuser environment | 
| D. | To ensure data integrity while reading data occurs to the database in a single-user environment | 
| Answer» B. To ensure data integrity when updates occur to the database in a single-user environment | |
| 10. | Information repositories are replacing data dictionaries in many organizations. | 
| A. | 1 | 
| B. | |
| C. | 1 | 
| D. | |
| Answer» B. | |
| 11. | Failure to control confidentiality may lead to loss of competitiveness. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 12. | Which of the following could cause data to be unavailable? | 
| A. | Data becoming lost or inaccurate | 
| B. | The database server | 
| C. | Planned database maintenance activities | 
| D. | All of the above. | 
| Answer» E. | |
| 13. | The greatest threat to business security is often internal rather than external. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 14. | Which of the following is the preferred way to recover a database after a system failure? | 
| A. | Rollback | 
| B. | Rollforward | 
| C. | Switch to duplicate database | 
| D. | Reprocess transactions | 
| Answer» D. Reprocess transactions | |
| 15. | Performance analysis and tuning is which of the following? | 
| A. | Undertaken one time at the time of a DBMS installation | 
| B. | Undertaken one time at the time of the implementation of a new application | 
| C. | Undertaken as an ongoing part of the backup of a database | 
| D. | Undertaken as an ongoing part of managing a database | 
| Answer» E. | |
| 16. | Authorization tables contain highly sensitive data and should be protected by stringent security rules. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 17. | A data warehouse administrator is concerned with which of the following? | 
| A. | The time to make a decision but not the typical roles of a database administrator | 
| B. | The time to make a decision and the typical roles of a database administrator | 
| C. | The typical roles of a data administrator and redesigning existing applications | 
| D. | The typical roles of a database administrator and redesigning existing applications | 
| Answer» C. The typical roles of a data administrator and redesigning existing applications | |
| 18. | Locking may cause which of the following problems? | 
| A. | Erroneous updates | 
| B. | Deadlock | 
| C. | Versioning | 
| D. | All of the above. | 
| Answer» C. Versioning | |
| 19. | Which of the following is true concerning open-source DBMS? | 
| A. | Is free or nearly free database software whose source code is publicly available | 
| B. | Is free or nearly free database software whose source code is not publicly available | 
| C. | Is not competitive against PC-oriented packages and is fully SQL compliant | 
| D. | Is competitive against PC-oriented packages and is not fully SQL compliant | 
| Answer» B. Is free or nearly free database software whose source code is not publicly available | |
| 20. | A shared lock allows which of the following types of transactions to occur? | 
| A. | Delete | 
| B. | Insert | 
| C. | Read | 
| D. | Update | 
| Answer» D. Update | |
| 21. | Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally. | 
| A. | 1 | 
| B. | |
| C. | 1 | 
| D. | |
| Answer» B. | |
| 22. | A transaction log shows before and after images of records that have been modified by transactions. | 
| A. | 1 | 
| B. | |
| Answer» C. | |
| 23. | Which of the following is part of an administrative policy to secure a database? | 
| A. | Authentication policies | 
| B. | Limiting particular areas within a building to only authorized people | 
| C. | Ensure appropriate responses rates are in external maintenance agreements | 
| D. | All of the above. | 
| Answer» E. | |
| 24. | Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally? | 
| A. | Rollback | 
| B. | Rollforward | 
| C. | Switch to duplicate database | 
| D. | Reprocess transactions | 
| Answer» B. Rollforward | |
| 25. | To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository. | 
| A. | 1 | 
| B. | |
| C. | 1 | 
| D. | |
| Answer» B. | |
| 26. | The transaction log includes which of the following? | 
| A. | The before-image of a record | 
| B. | The after-image of a record | 
| C. | The before and after-image of a record | 
| D. | The essential data of the record | 
| Answer» E. | |
| 27. | A traditional data administrator performs which of the following roles? | 
| A. | Tune database performance | 
| B. | Establish backup and recovery procedures | 
| C. | Resolve data ownership issues | 
| D. | Protect the security of the database. | 
| Answer» D. Protect the security of the database. | |
| 28. | If both data and database administration exist in an organization, the database administrator is responsible for which of the following? | 
| A. | Data modeling | 
| B. | Database design | 
| C. | Metadata | 
| D. | All of the above. | 
| Answer» C. Metadata | |
| 29. | Backward recovery is which of the following? | 
| A. | Where the before-images are applied to the database | 
| B. | Where the after-images are applied to the database | 
| C. | Where the after-images and before-images are applied to the database | 
| D. | Switching to an existing copy of the database | 
| Answer» B. Where the after-images are applied to the database | |
| 30. | Poor data administration can lead to which of the following? | 
| A. | A single definition of the same data entity | 
| B. | Familiarity with existing data | 
| C. | Missing data elements | 
| D. | All of the above. | 
| Answer» D. All of the above. | |