option
Cuestiones
ayuda
daypo
buscar.php

dbms222

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
dbms222

Descripción:
giangle

Fecha de Creación: 2024/01/05

Categoría: Otros

Número Preguntas: 107

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

1. Program-data dependence is caused by: Sự phụ thuộc dữ liệu chương trình được gây ra bởi. A) file descriptions being stored in each database application. B) data descriptions being stored on a server. C) data descriptions being written into programming code. D) data cohabiting with programs.

5. All of the following are primary purposes of a database management system (DBMS) EXCEPT: A) creating data. B) updating data. C) storing data. D) providing an integrated development environment.

6. With the database approach, data descriptions are stored in a central location known as. server. mainframe. PC. repository.

7. Which of the following is NOT an advantage of database systems?. Redundant data. Program-data independence. Better data quality. Reduced program maintenance.

8. The most common source of database failures in organizations is: A) lack of planning. B) inadequate budget. C) inadequate hardware. D) failure to implement a strong database administration function.

9) In a file processing environment, descriptions for data and the logic for accessing the data are built into: A) application programs. B) database descriptors. C) fields. D) records.

10) Which of the following is NOT a cost and/or risk of the database approach?. A) Specialized personnel. B) Cost of conversion. C) Improved responsiveness. D) Organizational conflict.

11. Which of the following is software used to create, maintain, and provide controlled access to databases?. A) Network operating system. B) User view. C) Database management system (DBMS). D) Attribute.

12. The three-schema approach includes which of the following schemas?. A) Internal. B) Logical. C) Cross-functional. D) Dissecting.

A key decision in the physical design process is: ignoring the size of the database. selecting structures. deciding the e-r diagrams. Deciding on the monitor.

14) A detailed coding scheme recognized by system software for representing organizational data is called as : A) DBMS code. B) Data type. C) SQL. D) DB layout.

15) All of the following are objectives when selecting a data type EXCEPT: A) represent all possible values. B) improve data integrity. C) support all data manipulations. D) use a lot of storage space.

16) All of the following are valid datatypes in Oracle 11g EXCEPT: A) varchar2. B) Boolean. C) blob. D) number.

17) The smallest unit of application data recognized by system software is a: A) field. B) row. B) row. C) data type. D) column.

18) An appropriate datatype for one wanting a fixed-length type for last name would include: A) VarChar. B) Char. C) Blob. D) Date.

19) An appropriate datatype for adding a sound clip would be: A) VarChar. B) Char. C) Blob. D) Date.

20) Which of the following is an objective of selecting a data type?. A) Represent a small number of possible values. B) Maximize storage space. C) Limit security. D) Improve data integrity.

21) In which data model would a code table appear?. A) Conceptual. B) Logical. C) Physical. D) Data layout.

22) An integrity control supported by a DBMS is: A) substitute estimates. B) security. C) range control. D) GUI guards.

23) The value a field will assume unless the user enters an explicit value for an instance of that field is called a: A) default value. B) null value. C) range control. D) gurand.

24) A method for handling missing data is to: A) substitute with random numbers for the missing data. B) track missing data with special reports. C) perform insensitivity testing. D) delete the associated row.

25) Sensitivity testing involves: A) checking to see if your teeth hurt when you brush. B) seeing how accurate data are. C) checking to see if missing data will greatly impact results. D) deleting the associated row.

26) A contiguous section of disk storage space is called a(n): A) track. B) sector. C) extent. D) tablespace.

27) A method to allow adjacent secondary memory space to contain rows from several tables is called: A) cluttering. B) clustering. C) concatenating. . D) compiling.

28) A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices. A) physical pointer. B) retrieval program. C) file organization. D) update program.

29) Distributing the rows of data into separate files is called: A) normalization. B) horizontal partitioning. C) vertical partitioning. D) file allocation.

30) Horizontal partitioning makes sense: A) when different categories of a table's rows are processed separately. B) when less security is needed. C) when partitions must be organized the same. D) when only one category is allowed.

31) An advantage of partitioning is: A) efficiency. B) remote optimization. C) extra space and update time. D) increase redundancy.

32) A disadvantage of partitioning is: A) simplicity. B) remote optimization. C) extra space and update time. D) shorter technology spans.

33) ________ partitioning distributes the columns of a table into several separate physical records. A) Horizontal. B) Crossways. C) Vertical. D) Final.

34) A form of denormalization where the same data are purposely stored in multiple places in the database is called: A) data duplication. B) data replication. C) advanced placement. D) horizontal partitioning.

35. Which of the following contains data rows in SQL Server. A. File group. B. Page. C. Partition. D. Block.

36. For the columns and data content of the employees table: Data type Numeric(6,0) Numeric(8,2) Column name employee_id salary 100 20000 101 10000 Your friend writes the program for salary update as follows: BEGIN TRY BEGIN TRANSACTION UPDATE employees SET salary = salary * 2 WHERE employee_id = 100 UPDATE employees SET salary = 10000000000 WHERE employee_id = 101 COMMIT TRANSACTION END TRY BEGIN CATCH ROLLBACK TRANSACTION RAISERROR('Thất bại', 14,1) END CATCH. A. Employee_id 100 l‡ 40000, Employee_id 101 l‡ 10000000000. B. Employee_id 100 l‡ 20000, Employee_id 101 l‡ 10000. C. Employee_id 100 l‡ 20000, Employee_id 101 l‡ 10000. D. Employee_id 100 l‡ 40000, Employee_id 101 l‡ 10000.

37. When no data is found in the Data Cache, Sql Server will load _______ from ______ into the Data Cache: A. Data ; Database. B. Page ; Data File. C. Block ; Database. D. Data Row ; Data File.

38. Which of the following is not a logical storage structure: A. Partition. C. Data File. B. Page. D. Extent.

39. Which of the following statements is not about performance received from filegroup. A. Read and write tasks in parallel. B. Ability to move indexes and large object data. C. Group the same files. D. Ability to split large data tables.

40. Note the following structures in your database server: 1 Extents 2 OS Blocks 3 Tablespace 4 Segments 5 Oracle Data Block Which option has the correct arrangement of these structures from the smallest to the largest?. A.1,2,3,4,5. B.2,5,1,4,3. C.5,2,1,3,4. D.2,1,5,4,3.

41. Note the following functionalities of various background processes: 1: Record the checkpoint information in data file headers. 2: Perform recovery at instance startup. 3: Cleanup unused temporary segments. 4: Free the resources used by a user process when it fails. 5: Dynamically register database services with listeners. 6: Monitor sessions for idle session timeout. Which option has the correct functionalities listed for a background process?. A. Archiver Process (ARCn): 1, 2, 5. B. System Monitor Process (SMON): 1, 4, 5. C. Process Monitor Process (PMON): 4, 5, 6. D. Database Writer Process (DBWn): 1, 3, 4.

42. Note the functionalities of various background processes: 1: Perform recovery at instance startup. 2: Free the resources used by a user process when it fails. 3: Cleanup the database buffer cache when a process fails. 4: Dynamically register database services with listeners. 5: Monitor sessions for idle session timeout. 6: Cleanup unused temporary segments. 7: Record the checkpoint information in control file. Which option has the correct functionalities listed for a background process?. A. Checkpoint (CKPT): 1, 2, 5. B. System Monitor (SMON): 1, 6. C. Process Monitor (PMON): 4, 6, 7. D. Database Writer (DBWR): 1, 3, 4.

43. View the Exhibit and identify the component marked with a question mark. Exhibit: A. Checkpoint (CKPT). B. Process Monitor (PMON). C. Archiver Processes (ARCn). D. Recoverer Process (RECO). E. Memory Manager process (MMAN).

44. Which two statements about the background process of the database writer are true? (Choose two.). A. It is possible to have multiple database writers in an Oracle instance. B. It writes dirty buffers, if any, to data files whenever a checkpoint occurs. C. It writes dirty buffers, if any, to data files whenever a transaction commits. D. It writes dirty buffers, if any, to data files before the log writer (LGWR) writes.

47. ________ is a technical function responsible for database design, security, and disaster recovery. A) Data administration. B) Database administration. C) Tech support. D) Operations.

48. The role of a ________ emphasizes integration and coordination of metadata across many data sources. A) data warehouse administrator. B) database administrator. C) data administrator. D) data architect.

49. An information repository supplies information: A) to database programmers only. B) to only internal sources. C) to database management systems. D) exclusively to data lakes.

50. A repository of information about a database that documents data elements of a database is called a: A) schema. B) subschema. C) view. D) data dictionary.

51. Which of the following is NOT a component of a repository system architecture? Điều nào sau đây KHÔNG phải là thành phần của kiến trúc hệ thống kho lưu trữ?. A) An informational model. B) The repository engine. C) A data transformation process. D) The repository database.

52. The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions. Các hành động phải được thực hiện để đảm bảo tính toàn vẹn dữ liệu được duy trì trong nhiều giao dịch đồng thời được gọi là ____ hành động. A) logging. B) concurrency control. C) transaction authorization. D) multiple management.

53. A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked. Một ____ ngăn giao dịch khác đọc và do đó cập nhật một bản ghi cho đến khi nó được mở khÛa. A) record controller. B) exclusive lock. C) authorization rule. D) shared lock.

54. An optimistic approach to concurrency control is called: Một cách tiếp cận lạc quan để kiểm soát đồng thời được gọi là: A) versioning. B) denormalization. C) deadlock resolution. D) Happy Control.

55. The ________ occurs when one user reads data that have been partially updated by another user. ________ xảy ra khi một người dùng đọc dữ liệu đã được cập nhật một phần bởi người d˘ng kh·c. A) inconsistent read problem. B) distant read problem vấn đề đọc xa. C) honest dirty data. D) data quality problem.

56. Guidelines for server security should include all of the following EXCEPT: Nguyên tắc bảo mật máy chủ phải bao gồm tất cả các NGOẠI TRỪ sau: A) securing the network between client and server. B) guidelines for password lengths. C) password naming conventions. D) guidelines for frequency of password changes.

57. Controls designed to restrict access and activities are called: Các điều khiển được thiết kế để hạn chế quyền truy cập và các hoạt động được gọi là: A) schemas. B) business rules. C) encryption controls. D) authorization rules.

58. A device to measure or detect fingerprints or signatures is called a(n) ________ device. Một thiết bị để đo hoặc phát hiện dấu vân tay hoặc chữ ký được gọi là thiết bị (n) ________. A) biometric. B) view. C) ink. D) laser.

59. The coding or scrambling of data so that humans cannot read them is called: Việc mã hóa hoặc xáo trộn dữ liệu để con người không thể đọc chúng được gọi là: A) demarcation. B) hiding. C) encoding. D) encryption mã hóa.

60. An audit trail of database changes is kept by: Một dấu vết kiểm toán thay đổi cơ sở dữ liệu được lưu giữ bởi: A) change control device. B) subschema. C) before image. D) journalizing facility.

61. A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a: DBMS định kỳ đình chỉ tất cả quá trình xử lý và đồng bộ hóa các tệp và tạp chí của nó thông qua việc sử dụng: A) checkpoint facility. B) backup facility. C) recovery manager. D) database change log.

62. A discrete unit of work that must be processed completely or not at all within a computer system is called a: A) change control device. B) transaction. C) before image. D) journalizing facility.

63. A ________ is a DBMS module that restores the database to a correct condition when a failure occurs. A) backup facility. B) recovery manager. C) restart facility. D) transaction logger.

64. ________ is used to undo unwanted database changes. A) Rollback. B) Rollforward. C) Restart. D) Encryption.

65. Forward recovery is faster than restore/rerun because: A) transactions do not have to be repeated. B) security can be avoided. C) images are mirrored. D) systems are more complete.

66. The preferred method of fixing an aborted transaction is: A) repairing the schema. B) switching. C) duplication of data. D) backing out the transaction.

67. When incorrect data have been introduced, the database is best recovered by: A) starting with a new ERD. B) formatting server. C) restarting from the most recent checkpoint and processing subsequent transactions. D) reloading RDMS software.

68. A transaction that terminates abnormally is called a(n) ________ transaction. A) terminated. B) aborted. C) completed. D) deleted.

69. Which of the following is NOT an area of concern when trying to maintain a well-tuned database?. A) Memory usage. B) CPU usage. C) Input/output contention. D) User interface design.

70. A(n) ________ is submitted by a DBA to test the current performance of a database or predict the response time for queries. Một (n) ________ được gửi bởi DBA để kiểm tra hiệu suất hiện tại của cơ sở dữ liệu hoặc dự đoán thời gian phản hồi cho các truy vấn. A) elusive query. B) performance test. C) heartbeat query. D) HTML.

71. Most data outages in organizations are caused by: A) hardware failures. B) software failures. C) human error. D) electrical outages.

72. For which database operation would you need the database to be in the MOUNT state? x. A. Renaming the control files. B. Recreating the control files. C. Dropping a in your database. D. Dropping a tablespace in your database. E. Configuring the database instance to operate in the ARCHIVELOG or NOARCHIVELOG.

73. Which statements listed below describe the data dictionary views? 1. These are stored in the SYSTEM tablespace 2. These are the based on the virtual tables 3. These are owned by the SYS user 4. These can be queried by a normal user only if O7_DICTIONARY_ACCESSIBLILITY parameter is set to TRUE 5. The V$FIXED_TABLE view can be queried to list the names of these views. A. 1 and 3. B. 2,3 and 5. D. 2,3,4 and 5. C. 1,2, and 5.

74. You have issued a SHUTDOWN ABORT command to bring down your database instance. Consider the steps that will be performed later when you open the database: 1 SGA is allocated. 2 Control file is read. 3 Redo log files are read. 4 Instance recovery is started. 5 Background processes are started. 6 Data files are checked for consistency. 7 Server parameter file or the initialization parameter file is read. Which option has the correct order in which these steps occur?. A.7,1,5,2,3,6,4. B. 1, 2, 3,7, 5, 6, 4. C.7,1,4,5,2,3,6. D.1,7,5,4,2,3,6.

75. Which three statements regarding the server parameter file (SPFILE) are true? (Choose three.). A. An SPFILE is a binary file/B. An SPFILE cannot reside on a client D. An SPFILE can store changes persistently across instance restarts. D. An SPFILE can store changes persistently across instance restarts. C. An SPFILE cannot contain static parameters. F.An SPFILE must be created manually, before creating a database, even if you use the.

76. Given below is a list of scenarios: 1) A user terminates his session abnormally. 2) The connection between the server and the client application terminates because of a network failure. 3) A schema is accidentally dropped 4) The tablespace is accidentally dropped from the database. 5) The hard disk gets corrupted and the data files in the disk are lost. 6) The database instance abnormally shuts down because of power failure. Which scenarios require DBA intervention to perform recovery?. A. 1, 3, and 6. B. 4, 5, and 6. C. 3, 4, and 5. D. 1, 2, and 6.

77. Which two statements are true regarding listeners? (Choose two.). A. Listeners use only the TCP/IP protocol. B. Multiple listener processes can run simultaneously on a host. C. Multiple database instances can be registered with a single listener. D. The listener related errors can be traced only at the administrative level. E. Only one database instance can be registered with a single listener at any time.

78. Your database is open and the LISTENER listener is running. The new DBA of the system st ops the listener by using the command: LSNRCTL> STOP What happens to the sessions that are presently connected to the database instance?. A. The sessions are able to perform only queries. B. The sessions are not affected and continue to function normally. C. The sessions are terminated and the active transactions are rolled back. D. The sessions are not allowed to perform any operations till the listener is started.

79. You executed the following command to create a tablespace called SALES_DATA SQL> CREATE TABLESPACE sales_data DATAFILE SIZE 100M SEGMENT SPACE MANAGEMENT AUTO; Which two statements are true about the SALES_DATA tablespace? (Choose two). A. The database automatically determines the extentsizing policy for the tablespace. D. The space utilization description of the data blocks in segments is recorded in bitmap blocks. E. The space utilization description of the data blocks in segments is managed through free lis. B. The segments are automatically shrunk when the contents are removed from them. C. The allocation of extents within the tablespace is managed through the dictionary tables.

81. Examine the command: SQL>ALTER USR skd ACCOUNT LOCK; Which two statements are true after the command is executed? (Choose two). A. The SKD user cannot log in to the database instance. B. The objects owned by the SKD user are not accessible to any user. C. The other users can access the objects owned by the SKD user, on which they have access. D. The password for the SKD user expires and the user is forced to change the password at the next log in.

82. You executed the following command to create a password file in the database server: $ orapwd file = orapworcl entries = 5 ignorecase=N Which statement describes the purpose of the above password file?. A. It records usernames and passwords of users when granted the DBA role. B. It contains usernames and passwords of users for whom auditing is enabled. C. It is used by Oracle to authenticate users for remote database administrator. D. It records usernames and passwords of all users when they are added to OSDBA or OSOPER operating Groups.

90.Which statement is true about a whole consistent database backup on a database running in ARCHIVELOG mode?. A. The backup will consist of used data blocks only. B. The database must be shut down to accomplish the backup. C. The backup can be accomplished without shutting down the database. D. The backup will contain all database files that have never been backed up.

91.You perform differential incremental level 1 backups of your database on each working day and level 0 backup on Sunday to tape: Which two statements are true about differential incremental backups? (Choose two.). A. The backup performed on Sundays contains all the blocks that have ever been used in the database D. The backup performed on Monday contains all the blocks that have changed since the level 0 backup and every other working day contains all the blocks that have changed since the level 1 backup. B. The backup performed on Sundays contains all the blocks that have changed since the last level 1 backup. C. The backup performed on each working day contains all the blocks that have changed since the last level 0 backup.

92. Your test database is configured to run in NOARCHIVELOG mode. One of the data files in the USERS tablespace is lost due to a media failure. You notice that all the online redo logs have been overwritten since the last backup. What would you do to recover the data file?. A. Take the USERS tablespace offline and re-create the lost data file. B. Shutdown the instance, restore the data file from the last consistent backup and restart the database instance. C. Shutdown the instance, restores all the database files from the last consistent backup and restart the database instance. D. Take the USERS tablespace offline, restore all the data files of the USERS tablespace from the last consistent backup and make the tablespace online.

1. A requirement to begin designing physical files and databases is: A) normalized relations. B) physical tables created. C) implementation complete. D) all datatypes determined.

2. Designing physical files requires ________ of where and when data are used in various ways. A) maps. B) descriptions. C) keys. D) hints.

3. Database access frequencies are estimated from: Tần suất truy cập cơ sở dữ liệu được ước tÌnh từ: A) transaction volumes. khối lượng giao dịch. B) user logins. C) security violations. D) random number generation.

4. The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. A) query design. B) programmer productivity. C) data integrity. D) data integration.

5. Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n): A) extent. B) table. C) tablespace. D) partition.

6. While Oracle has responsibility for managing data inside a tablespace, the tablespace as a whole is managed by the: A) user. B) CEO. C) XML. D) operating system.

7. A(n) ________ is a field of data used to locate a related field or record. A) key. B) index. C) lock. D) pointer.

8. Which type of file is most efficient with storage space?. A) Sequential. B) Hashed. C) Indexed. D) Clustered.

9. Which type of file is easiest to update?. A) Sequential. B) Hashed. C) Indexed. D) Clustered.

10. A factor to consider when choosing a file organization is: A) inefficient data retrieval. B) DDL. C) efficient storage. D) DML.

11. One field or combination of fields for which more than one record may have the same combination of values is called a(n): A) secondary key. B) index. C) composite key. D) linked key.

12. In which type of file is multiple key retrieval not possible? Trong loại tệp n‡o thÏ khÙng thể truy xuất nhiều khÛa?. A) Sequential. B) Hashed. C) Indexed. D) Clustered.

13. A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a: Một tổ chức tệp sử dụng hàm băm để ·nh xạ khÛa v‡o một vị trÌ trong chỉ mục nơi có con trỏ tới bản ghi dữ liệu thực ph˘ hợp với khóa băm được gọi l‡: A) hashed file organization. B) hash key. C) multi-indexed file organization. D) hash index table.

14. A file organization where files are not stored in any particular order is considered a: A) hashed file organization. B) hash key. C) multi-indexed file organization. D) heap file organization.

15. An index on columns from two or more tables that come from the same domain of values is called a: A) bitmap index. B) multivalued index. C) join index. D) transaction index.

16. A(n) ________ is a routine that converts a primary key value into a relative record number. A) record index calculator. B) index pointer program. C) hashing algorithm. D) pointing algorithm.

17. A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called: A) multiple partition queries. B) perpendicular query processing. C) parallel query processing. D) query optimization.

18. A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers and join tables to prepare query results is the: A) explain plan. B) show optimization. C) explain query. D) analyze query.

19. All of the following are common denormalization opportunities EXCEPT: A) two entities with a one-to-one relationship. B) a one-to-many relationship. C) a many-to-many relationship with nonkey attributes. D) reference data.

20. In most cases, the goal of ________ dominates the design process. A) efficient data processing. B) security. C) quick pointer updates. D) shorter design times.

21. All of the following are horizontal partitioning methods in Oracle EXCEPT: A) key range partitioning. B) hash partitioning. C) multivalued partitioning. D) composite partitioning.

A factor to consider when choosing a file organization is: Một yếu tố cần xem xét khi chọn cách tổ chức tập tin là: fast data retrieval. truy xuất dữ liệu nhanh chóng. security. bảo mật. efficient storage. lưu trữ hiệu quả. all of the above.

A rule of thumb for choosing indexes is to: be careful indexing attributes that may be null. use an index when there is variety in attribute values. index each primary key of each table. all of the above.

**A method for handling missing data is to: substitute and estimate for the missing data. perform sensitivity testing. track missing data with special reports. all of the above.

In most cases the goal of ________ dominates the design process. efficient data processing. security. quick pointer updates. shorter design times.

9) In a file processing environment, descriptions for data and the logic for accessing the data are built into: application programs. descriptors. C) fields. D) records.

57. Controls designed to restrict access and activities are called: Các điều khiển được thiết kế để hạn chế quyền truy cập và các hoạt động được gọi là: A) schemas. B) business rules. C) encryption controls. D) authorization rules.

75. Which three statements regarding the server parameter file (SPFILE) are true? (Choose three.). A. An SPFILE is a binary file. D. An SPFILE can store changes persistently across instance restarts. B. An SPFILE cannot reside on a client. C. An SPFILE cannot contain static parameters. E. An SPFILE can be read by the database server, but it is not written to by the server. F.An SPFILE must be created manually, before creating a database, even if you use the Datab ase Configuration Assistant (DBCA) to create the database.

Denunciar Test