Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Data about the data in a database is known as ___. |
metadata |
|
___ contain information about table relationships, view, indexes, users, privileges, and replicated data. |
Catalogs |
|
Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export? |
Portability |
|
___ integrity is the constraint that says that the values in foreign keys must match values already in the database. |
Referential |
|
To break deadlock, the DBMS chooses one deadlocked user to be the ___. |
victim |
|
A ___ is a snapshot of certain data in a database at a given moment in time. |
view |
|
The ___ determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog to ensure that users access the database only in ways in which they are entitled to do so. |
DBA |
|
In order to develop new programs, the programmers need access to the information in the DBMS. They are given access to the ___. |
test system |
|
___ rules specify which users have what type of access to which data in the database. |
Authorization |
|
By default, Access and the other DBMSs create indexes automatically for the primary and ___ keys. |
foreign |
|
___ converts a table that is in third normal form to a table no longer in third normal form. |
Denormalization |
|
If two or more users are waiting for the other user to release a lock before they can proceed, this is known as a ___. |
deadlock |
|
___ integrity implies that the value entered for any field should be consistent with the data type for that field. |
Data type |
|
Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time? |
Limitations |
|
___ is the process of returning the database to a state that is known to be correct from a state known to be correct. |
Recovery |
|
A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a database ___. |
password |
|
Tables with indexes allow faster searches, but slower performance on ___. |
updates |
|
___ denies access by other users to data while the DBMS processes one user’s updates to the database. |
Locking |
|
Changing the database design to improve the performance is called ___ the design. |
tuning |
|
After the database designers complete the information-level design, the DBA does the ___-level design. |
physical |
|
___ integrity constraints help to ensure the accuracy and consistency of individual field values. |
Data |
|
The DBMS accomplishes ___ by reading the log for the problem transactions and applying the before images to undo their updates. |
backward recovery |
|
The technique for identifying the person who is attempting to access the DBMS is known as ___. |
authentication |
|
___ locks forbid any other users from accessing the data in anyway. |
Exclusive |
|
___ identify users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics. |
Biometrics |