11. Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally? A. Rollback B. Rollforward C. Switch to duplicate database D. Reprocess transactions Answer & Solution Discuss in Board Save for Later Answer & Solution Answer: Option A No explanation is given for this question Let's Discuss on Board
12. Which of the following is true concerning open-source DBMS? A. Is free or nearly free database software whose source code is publicly available B. Is free or nearly free database software whose source code is not publicly available C. Is not competitive against PC-oriented packages and is fully SQL compliant D. Is competitive against PC-oriented packages and is not fully SQL compliant Answer & Solution Discuss in Board Save for Later Answer & Solution Answer: Option A No explanation is given for this question Let's Discuss on Board
13. Concurrency control is important for which of the following reasons? A. To ensure data integrity when updates occur to the database in a multiuser environment B. To ensure data integrity when updates occur to the database in a single-user environment C. To ensure data integrity while reading data occurs to the database in a multiuser environment D. To ensure data integrity while reading data occurs to the database in a single-user environment Answer & Solution Discuss in Board Save for Later Answer & Solution Answer: Option A No explanation is given for this question Let's Discuss on Board
14. Which of the following is the preferred way to recover a database after a system failure? A. Rollback B. Rollforward C. Switch to duplicate database D. Reprocess transactions Answer & Solution Discuss in Board Save for Later Answer & Solution Answer: Option C No explanation is given for this question Let's Discuss on Board
15. A data warehouse administrator is concerned with which of the following? A. The time to make a decision but not the typical roles of a database administrator B. The time to make a decision and the typical roles of a database administrator C. The typical roles of a data administrator and redesigning existing applications D. The typical roles of a database administrator and redesigning existing applications Answer & Solution Discuss in Board Save for Later Answer & Solution Answer: Option B No explanation is given for this question Let's Discuss on Board
16. To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository. A. True B. False Answer & Solution Discuss in Board Save for Later Answer & Solution Answer: Option A No explanation is given for this question Let's Discuss on Board
17. Failure to control confidentiality may lead to loss of competitiveness. A. True B. False Answer & Solution Discuss in Board Save for Later Answer & Solution Answer: Option A No explanation is given for this question Let's Discuss on Board
18. Authorization tables contain highly sensitive data and should be protected by stringent security rules. A. True B. False Answer & Solution Discuss in Board Save for Later Answer & Solution Answer: Option A No explanation is given for this question Let's Discuss on Board
19. A transaction log shows before and after images of records that have been modified by transactions. A. True B. False Answer & Solution Discuss in Board Save for Later Answer & Solution Answer: Option B No explanation is given for this question Let's Discuss on Board
20. The greatest threat to business security is often internal rather than external. A. True B. False Answer & Solution Discuss in Board Save for Later Answer & Solution Answer: Option A No explanation is given for this question Let's Discuss on Board