• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/56

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

56 Cards in this Set

  • Front
  • Back

The overall responsibility of the ____________________is to facilitate the development and use of the database.

Database Administrator

A(n) ____________________ is a series of actionsto be taken on the database such that either all of them are performedsuccessfully or none of them is performed at all.

Atomic transaction

A transaction is sometimes called ____________________,since it is performed as a unit.

Atomic

Locks placed automatically by the DBMS are called ____________________ locks.

Implicit

Locks placed by a command issued to the DBMS from the application program are called ____________________ locks.

Explicit

The size of a lock is referred to as the lock ____________________.

Granularity

A(n) ____________________ lock locks the item from access of any type.

Exclusive

A(n) ____________________ lock locks the item from change but not from read access.

Shared

Two-phased locking is a scheme for achieving ____________________ of transactions.

Serializability

In two-phase locking, all locks are obtained during the ____________________ phase.

Growing

In two-phase locking, all locks are released during the ____________________ phase.

Shrinking

Requiring all application programs to lock resources in the same order is one way of preventing a ____________________ condition.

Deadlock

With ____________________ locking, the assumption is made that no conflict will occur.

Optimistic

With ____________________ locking, the assumption is made that a conflict will occur.

Pessimistic

The transaction ____________________ are the essential information that the DBMS needs from the application programs to enforce different locking strategies.

Boundaries

A(n) ____________________ transaction is one for which all committed changes are permanent.

Durable

Transaction level ____________________ means that all rows impacted by any actions in a transaction are protected from change during the entire transaction.

Consistency

A(n) ____________________ occurs when one transaction reads a changed record that has not been committed to the database.

Dirty Read

____________________ occur when a transaction rereads data it has previously read and finds modifications or deletions caused by a committed transaction.

A non-repeatable read

According to ANSI SQL, the ____________________ isolation level will not allow phantom reads, dirty reads, and nonrepeatable reads.

Serializable

A(n) ____________________ cursor processes a snapshot of the relation that was taken when the cursor was opened.

Static

A(n) ____________________ cursor saves primary key values when the cursor is opened and retrieves the values for each row as the application program accesses it.

Key Set

____________________ is a method of database recovery that restores the database save and all valid transactions since the save was reapplied.

Roll forward

To support rollforward and rollback recovery, transactions must be written to a(n) ____________________ before they are applied to the database.

Log

Copies of each database record or page before it was changed by a transaction that are saved for use in database recovery are called ____________________.

Before Images

Copies of each database record or page after it was changed by a transaction that are saved for use in database recovery are called ____________________.

After Images

A(n) ____________________ is a point of synchronization between the database and the transaction log.

Checkpoint

A(n) ____________________ data repository is one in which the metadata is automatically created as the system components are created.

Active

A(n) ____________________ data repository is one which requires a person to generate the metadata and place it in the repository.

Passive

____________________ is a programming language provided with Oracle that adds programming constructs to the SQL language.

PL / SQL

A(n) ____________________ is an object that generates a sequential series of unique numbers.

Sequence

Sequences are most often used to provide values for ____________________ keys.

Surrogate

The ____________________ method provides the next value in a sequence.

NextVal

The ____________________ method provides the current value in a sequence.

CurVal

Using sequences ________ valid surrogate key values.

Does not guarantee

The PL/SQL keyword ________ is used to begin the basic PL/SQL block structure.

DECLARE

The PL/SQL keyword ________ is used to define a group of PL/SQL statements.

BEGIN

The PL/SQL keyword ________ is used to check for the existence of a condition.

IF

The PL/SQL keywords FOR, WHILE, and LOOP are used to create blocks of code that ________ until an ending condition is reached.

Repeat

The PL/SQL keyword ________ is used to complete the basic PL/SQL block structure.

END

The PL/SQL keyword ________ is used to exit a block of code and terminate whatever code structure is running.

RETURN

When creating an Oracle stored procedure using SQL*Plus, issuing the ____________________ keyword signifies that a parameter is an input parameter.

IN

When creating an Oracle stored procedure using SQL*Plus, issuing the ____________________ keyword signifies that a parameter is an output parameter.

OUT

When creating an Oracle stored procedure using SQL*Plus, issue the ____________________ command to see any reported compilation errors.

SHOW ERRORS

In Oracle, triggers that are fired once for each row that is changed in a table are called ____________________.

ROW TRIGGERS

____________________ triggers are placed on views.

INSTEAD OF

____________________ and ____________________ triggers are placed on tables.

BEFORE, AFTER

The prefix ____________________ is used with values of columns available to insert and update triggers.

:new

The prefix ____________________ is used with values of columns available to update and delete triggers.

:old

The ____________________ transaction isolation level is unique to Oracle.

READ ONLY

In Oracle recovery facilities, ____________________ files are small files that describe the name, contents, and locations of various files used by Oracle.

control

In Oracle recovery facilities, ____________________ files are maintained on disk and contain the rollback segments from recent database changes.

online redo

In Oracle recovery facilities, ____________________ files are backup log files maintained separately and not necessarily on disk media.

offline redo

The type of failure that occurs when Oracle itself fails due to an operating system or computer hardware failure is called a(n) ____________________ failure.

instance

The type of failure that occurs when Oracle is unable to write to a physical file is called a(n) ____________________ failure.

media

In Oracle backup and recovery facilities, a(n) ____________________ backup is one in which all uncommitted changes have been removed from the datafiles.

consistent