

MCQOPTIONS
Saved Bookmarks
This section includes 31 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
1. |
Incorrect data is easy to detect.%! |
A. | True |
B. | False |
Answer» C. | |
2. |
The restore/rerun technique involves reprocessing the day's transactions up to the point of failure.%! |
A. | True |
B. | False |
Answer» B. False | |
3. |
The greatest threat to business security is often internal rather than external.%! |
A. | True |
B. | False |
Answer» B. False | |
4. |
Data modeling and database design are key responsibilities of data and data base administration.%! |
A. | True |
B. | False |
Answer» B. False | |
5. |
Queries that do full table scans should be avoided.%! |
A. | True |
B. | False |
Answer» B. False | |
6. |
A transaction log shows before and after images of records that have been modified by transactions.%! |
A. | True |
B. | False |
Answer» C. | |
7. |
With concurrent processing involving updates, a database with concurrency control will be compromised due to interference between users.%! |
A. | True |
B. | False |
Answer» C. | |
8. |
Databases are not the property of a single function or individual within the organization.%! |
A. | True |
B. | False |
Answer» B. False | |
9. |
Authorization tables contain highly sensitive data and should be protected by stringent security rules.%! |
A. | True |
B. | False |
Answer» B. False | |
10. |
A disaster recovery plan does not need to include the shipment of database backups to other sites.%! |
A. | True |
B. | False |
Answer» C. | |
11. |
Mirrored databases are almost always provided in high-availability systems.%! |
A. | True |
B. | False |
Answer» B. False | |
12. |
Failure to control confidentiality may lead to loss of competitiveness.%! |
A. | True |
B. | False |
Answer» B. False | |
13. |
Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally.%! |
A. | True |
B. | False |
Answer» B. False | |
14. |
Information repositories are replacing data dictionaries in many organizations.%! |
A. | True |
B. | False |
Answer» B. False | |
15. |
To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.%! |
A. | True |
B. | False |
Answer» B. False | |
16. |
Performance analysis and tuning is which of the following?%! |
A. | Undertaken one time at the time of a DBMS installation |
B. | Undertaken one time at the time of the implementation of a new application |
C. | Undertaken as an ongoing part of the backup of a database |
D. | Undertaken as an ongoing part of managing a database |
Answer» E. | |
17. |
A data warehouse administrator is concerned with which of the following?%! |
A. | The time to make a decision but not the typical roles of a database administrator |
B. | The time to make a decision and the typical roles of a database administrator |
C. | The typical roles of a data administrator and redesigning existing applications |
D. | The typical roles of a database administrator and redesigning existing applications |
Answer» C. The typical roles of a data administrator and redesigning existing applications | |
18. |
*$_Backward recovery is which of the following?? |
A. | Where the before-images are applied to the database |
B. | Where the after-images are applied to the database |
C. | Where the after-images and before-images are applied to the database |
D. | Switching to an existing copy of the database |
Answer» B. Where the after-images are applied to the database | |
19. |
*/*_A data warehouse administrator is concerned with which of the following?? |
A. | The time to make a decision but not the typical roles of a database administrator |
B. | The time to make a decision and the typical roles of a database administrator |
C. | The typical roles of a data administrator and redesigning existing applications |
D. | The typical roles of a database administrator and redesigning existing applications |
Answer» C. The typical roles of a data administrator and redesigning existing applications | |
20. |
*/*_Performance analysis and tuning is which of the following?? |
A. | Undertaken one time at the time of a DBMS installation |
B. | Undertaken one time at the time of the implementation of a new application |
C. | Undertaken as an ongoing part of the backup of a database |
D. | Undertaken as an ongoing part of managing a database |
Answer» E. | |
21. |
_ Which of the following is part of an administrative policy to secure a database?$? |
A. | Authentication policies |
B. | Limiting particular areas within a building to only authorized people |
C. | Ensure appropriate responses rates are in external maintenance agreements |
D. | All of the above |
Answer» E. | |
22. |
_ Which of the following is the preferred way to recover a database after a system failure?$? |
A. | Rollback |
B. | Rollforward |
C. | Switch to duplicate database |
D. | Reprocess transactions |
Answer» D. Reprocess transactions | |
23. |
_ Locking may cause which of the following problems?$? |
A. | Erroneous updates |
B. | Deadlock |
C. | Versioning |
D. | All of the above |
Answer» C. Versioning | |
24. |
_If both data and database administration exist in an organization, the database administrator is responsible for which of the following?$? |
A. | Data modeling |
B. | Database design |
C. | Metadata |
D. | All of the above |
Answer» C. Metadata | |
25. |
_Concurrency control is important for which of the following reasons?$? |
A. | To ensure data integrity when updates occur to the database in a multiuser environment |
B. | To ensure data integrity when updates occur to the database in a single-user environment |
C. | To ensure data integrity while reading data occurs to the database in a multiuser environment |
D. | To ensure data integrity while reading data occurs to the database in a single-user environment |
Answer» B. To ensure data integrity when updates occur to the database in a single-user environment | |
26. |
_A shared lock allows which of the following types of transactions to occur?$? |
A. | Delete |
B. | Insert |
C. | Read |
D. | Update |
Answer» D. Update | |
27. |
Which of the following could cause data to be unavailable?$? |
A. | Data becoming lost or inaccurate |
B. | The database server |
C. | Planned database maintenance activities |
D. | All of the above |
Answer» E. | |
28. |
Which of the following is true concerning open-source DBMS?$? |
A. | Is free or nearly free database software whose source code is publicly available |
B. | Is free or nearly free database software whose source code is not publicly available |
C. | Is not competitive against PC-oriented packages and is fully SQL compliant |
D. | Is competitive against PC-oriented packages and is not fully SQL compliant |
Answer» B. Is free or nearly free database software whose source code is not publicly available | |
29. |
A traditional data administrator performs which of the following roles?? |
A. | Tune database performance |
B. | Establish backup and recovery procedures |
C. | Resolve data ownership issues |
D. | Protect the security of the database |
Answer» D. Protect the security of the database | |
30. |
Which of the following is true concerning open-source DBMS?? |
A. | Is free or nearly free database software whose source code is publicly available |
B. | Is free or nearly free database software whose source code is not publicly available |
C. | Is not competitive against PC-oriented packages and is fully SQL compliant |
D. | Is competitive against PC-oriented packages and is not fully SQL compliant |
Answer» B. Is free or nearly free database software whose source code is not publicly available | |
31. |
Which of the following could cause data to be unavailable?? |
A. | Data becoming lost or inaccurate |
B. | The database server |
C. | Planned database maintenance activities |
D. | All of the above |
Answer» E. | |