• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

Data about the data in a database is known as ___.

metadata

___ contain information about table relationships, view, indexes, users, privileges, and replicated data.

Catalogs

Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export?

Portability

___ integrity is the constraint that says that the values in foreign keys must match values already in the database.

Referential

To break deadlock, the DBMS chooses one deadlocked user to be the ___.

victim

A ___ is a snapshot of certain data in a database at a given moment in time.

view

The ___ determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog to ensure that users access the database only in ways in which they are entitled to do so.

DBA

In order to develop new programs, the programmers need access to the information in the DBMS. They are given access to the ___.

test system

___ rules specify which users have what type of access to which data in the database.

Authorization

By default, Access and the other DBMSs create indexes automatically for the primary and ___ keys.

foreign

___ converts a table that is in third normal form to a table no longer in third normal form.

Denormalization

If two or more users are waiting for the other user to release a lock before they can proceed, this is known as a ___.

deadlock

___ integrity implies that the value entered for any field should be consistent with the data type for that field.

Data type

Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time?

Limitations

___ is the process of returning the database to a state that is known to be correct from a state known to be correct.

Recovery

A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a database ___.

password

Tables with indexes allow faster searches, but slower performance on ___.

updates

___ denies access by other users to data while the DBMS processes one user’s updates to the database.

Locking

Changing the database design to improve the performance is called ___ the design.

tuning

After the database designers complete the information-level design, the DBA does the ___-level design.

physical

___ integrity constraints help to ensure the accuracy and consistency of individual field values.

Data

The DBMS accomplishes ___ by reading the log for the problem transactions and applying the before images to undo their updates.

backward recovery

The technique for identifying the person who is attempting to access the DBMS is known as ___.

authentication

___ locks forbid any other users from accessing the data in anyway.

Exclusive

___ identify users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics.

Biometrics