Database Processing, 13e (Kroenke/Auer)
Chapter 9: Managing Multiuser Databases
1) Database administration tasks have to be performed for single-user, personal databases.
Answer: TRUE
Diff: 3 Page Ref: 396
2) Database administration is more important but less difficult in multiuser database systems than in single-user database systems.
Answer: FALSE
Diff: 2 Page Ref: 396
3) In general, the overall responsibility of the DBA is to facilitate the development and use of the database system.
Answer: TRUE
Diff: 1 Page Ref: 396
4) The DBA has to find a balance between the conflicting goals of maximizing availability of the database to users and protecting the database.
Answer: TRUE
Diff: 2 Page Ref: 396
5) The DBA
…show more content…
Answer: TRUE
Diff: 3 Page Ref: 403-404
31) The transaction boundaries are the essential information that the DBMS needs from the application programs to enforce different locking strategies.
Answer: TRUE
Diff: 3 Page Ref: 404-405
32) A durable transaction is one for which all committed changes are permanent.
Answer: TRUE
Diff: 3 Page Ref: 406
33) Transaction level consistency means that all rows impacted by any actions in a transaction are protected from change during the entire transaction.
Answer: TRUE
Diff: 2 Page Ref: 406-407
34) A dirty read happens when one transaction reads a changed record that has not been committed to the database.
Answer: TRUE
Diff: 3 Page Ref: 407-408 Fig 9-11
35) Nonrepeatable reads occur when a transaction rereads data it has previously read and finds modifications or deletions caused by a committed transaction.
Answer: TRUE
Diff: 3 Page Ref: 407-408 Fig 9-11
36) Repeatable Read isolation is the most restrictive level of isolation.
Answer: FALSE
Diff: 2 Page Ref: 408 Fig 9-12
37) According to ANSI SQL, the serializable isolation level will not allow phantom reads, dirty reads, and nonrepeatable reads.
Answer: TRUE
Diff: 3 Page Ref: 408 Fig 9-12
38) A static cursor processes a snapshot of the relation that was taken when the cursor was opened.
Answer: TRUE
Diff: 2 Page Ref:
3. A redo algorithm is performed for a transaction that commits after the last checkpoint from the log
A database administration framework (DBMS) is a PC programming application that connects with the client, different applications, and the database itself to catch and dissect information. A universally useful DBMS is intended to permit the definition, creation, questioning, upgrade, and organization of databases.
A transaction may not constantly complete its execution successfully. Such a transaction is called as ---------
Let’s start with Exercise 3-22A and practice developing journal entries to make adjustments. Select one of the six transactions and develop the adjusting journal entry. If you are using an example found in the textbook do mention the page number.
This causes an inconsistency in the data since it was only updated in one location and not all locations. Insertion anomalies occur due to the impossibility to store some information unless other information is stored as well. Deletion anomalies are caused by information being deleted that may cause other information to be deleted as well. This means it may not be possible to delete some information without deleting other information as well. That is why it is important to use normalization when creating databases to help alleviate these problems.
* Write clearly and concisely about relational database management systems using proper writing mechanics and technical style conventions.
12. The I/O processor has a straight admission to....................... And covers a number of independent data channels.
l. If transactions are deleted, annotate the supporting documents with the status (i.e. duplicate, no action required, incomplete-return to unit, et.) and return to unit using a discrepancy letter.
Section 10 defines the conditions if a change or error in an electronic record occurs in a transmission between parties to a transaction
Match the following characteristics to their types of memory. The answers can be used more than once.
Database executive or other individual accountable for database development should anticipate that new framework that offers proportionate arrangement of administrations when contrasted with the essential DBMS. When talking about Oracle database, it is clear that none of the other social database administration frameworks
This paper mainly describes about the snapshot isolation and there validation steps for update transactions and serializability issues of snapshot isolation. To maintain more than one version of a data items it can possible to permit a single transaction to read an existing version of a data item rather than the more update version created by an uncommitted transaction or by a transaction that ought to come later in serialization order. To obtain this there are different types of multi-version concurrency control techniques one of those techniques which widely used in the real world is snapshot isolation. It has been used by major database management system to obtain high throughput. It also provides better performance than the serialzability so it’s gained wide acceptance in commercial and open source systems such as Oracle, SQL, PostgreSQL, Interbase, Firebird.
Easy data access- The DBMS makes it possible to produce quick answers to queries. From a database perspective, a query is a specific request issued to the DBMS for data manipulation.