Database Concepts 6th Edition By kroenke – Test Bank A+

$35.00
Database Concepts 6th Edition By kroenke – Test Bank A+

Database Concepts 6th Edition By kroenke – Test Bank A+

$35.00
Database Concepts 6th Edition By kroenke – Test Bank A+


Diff: 2 Page Ref: 347

62) Microsoft Access 2010 can secure database files by storing them in a(n) ________.

Answer: trusted location

Diff: 2 Page Ref: 329

63) Microsoft Access 2010 can secure databases by using ________ to encrypt and decrypt the database files.

Answer: passwords

Diff: 3 Page Ref: 336

64) Microsoft Access 2010 can secure databases by deploying databases packaged with a(n) ________.

Answer: digital signature

Diff: 2 Page Ref: 342

65) When Microsoft Access 2010 compiles VBA code in a database, the resulting file is stored using a(n) ________ file extension.

Answer: *.accde

Diff: 2 Page Ref: 342

66) What database administration functions help bring order to the potential chaos of the database processing environment?

Answer: First, the actions of concurrent users must be controlled so that consistent results are obtained. Second, security measures are necessary so that only authentic users who are properly authorized are permitted to take appropriate actions on databases. Finally, backup and recovery techniques and procedures must be in place to protect databases and the data they contain.

Diff: 1 Page Ref: 303-304

67) Explain the concept of an “atomic transaction.”

Answer: An atomic transaction is a transaction in which either all steps must be completed successfully, or none of the steps can be completed at all. A transaction becomes atomic when the complete set of steps within the transaction is a single logical unit of work.

Diff: 1 Page Ref: 306-307

68) Briefly define the three problems that can occur because of concurrent processing that are addressed by resource locking.

Answer: The three problems that can occur because of concurrent processing are dirty reads, nonrepeatable reads, and phantom reads. A dirty read occurs when a transaction reads a changed record that has not been committed to the database. If the change is cancelled before it is committed, then the read will contain incorrect data. A nonrepeatable read occurs when a transaction rereads data and finds modifications or deletions caused by another transaction. A phantom read occurs when a transaction rereads data and finds new rows that were inserted by another transaction since the prior read.

Diff: 2 Page Ref: 309

69) Briefly explain the strategy of two-phased locking.

Answer: Two-phased locking is a strategy to ensure the serializability of transactions. A transaction is allowed to obtain locks as necessary, but once the first lock is released, no other locks may be obtained. This produces the two-phased effect—the growing phase in which locks are obtained and the shrinking phase as locks are released.

Diff: 2 Page Ref: 310-311

70) Explain the process of using optimistic locking.

Answer: Optimistic locking makes the assumption that no conflicts will occur. Data is read, the transaction is processed, updates are issued, and then a check is made to see if a conflict occurred. If a conflict does occur, the transaction is repeated until it completes without a conflict. Thus, the lock is not secured until the transaction is completed. This reduces the amount of time that the lock is held.

Diff: 2 Page Ref: 311-312

71) Distinguish between statement-level consistency and transaction-level consistency.

Answer: Statement-level consistency requires that a statement apply to a set of rows that is consistent from the beginning of the statement until the end of the statement. Transaction-level consistency indicates that the set of rows will remain consistent throughout the processing of all statements within the transaction.

Diff: 2 Page Ref: 313-314

72) What are the four transaction isolation levels?

Answer: The four levels of isolation are Read Uncommitted, Read Committed, Repeatable Read, and Serializable. Read Uncommitted is the least restrictive, and it produces reads that are susceptible to dirty reads, nonrepeatable reads, and phantom reads. Read Committed isolation prevents dirty reads by only reading committed changes. Repeatable Read isolation prevents dirty reads and nonrepeatable reads. Serializable is the most restrictive level of isolation, and it prevents dirty reads, nonrepeatable reads, and phantom reads.

Diff: 3 Page Ref: 314-315

73) What is the difference between authentication and authorization?

Answer: Authentication refers to making sure a user has the right to use the computer system in the first place. It is the precursor to authorization, which is assigning an authenticated user permission to perform specific tasks on the system. Both are need for effective computer system security.

Diff: 2 Page Ref: 317

74) Why do computers fail?

Answer: Computers fail for a variety of reasons, including (1) hardware failure, (2) electrical power outages, (3) bugs in computer programs, (4) errors in procedures, and (5) human error.

Diff: 2 Page Ref: 323

75) Distinguish between reprocessing and rollforward as database recovery techniques.

Answer: Reprocessing and rollforward both require the use of database saves, which are backups of the database at a known state. Reprocessing as a means of recovery involves recovering the database from the last database save and having the application programs reprocess all the transactions since the save. Rollforward as a means of recovery involves recovering the database from the last save and then reapplying all changes to the database. Reprocessing does not always reproduce the original database contents correctly since minute changes in processing by the application programs may result in changes in data manipulation.

Diff: 3 Page Ref: 323-326

76) Discuss Microsoft Access 2010 security administration.

Answer: Microsoft Access 2010 files can be secured using three methods: (1) by creating trusted locations for file storage, (2) by password encryption and decryption of database files, and (3) by deploying databases packaged with a digital signature. Additionally, Microsoft Access 2010 can compile VBA code used with an Access 2007 database file. Finally Microsoft Access 2010 can still use user-level security for older *.mdb database files (but not for Access 2010 *.accdb files). User-level security settings are stored in workgroup information files (*.mdw).

Diff: 3 Page Ref: 328-347

Database Concepts, 6e (Kroenke/Auer)

Chapter 7 Database Processing Applications

1) A trigger is an event stored in a database that is invoked by the DBMS when specified events occur.

Answer: TRUE

Diff: 1 Page Ref: 361

2) A BEFORE trigger is called by the DBMS before reading data.

Answer: FALSE

Diff: 2 Page Ref: 361

3) A stored procedure is a module of logic normally written in a traditional programming language like C++ and stored in the application program.

Answer: FALSE

Diff: 2 Page Ref: 361

4) A stored procedure is invoked automatically by the DBMS whenever certain events occur.

Answer: FALSE

Diff: 1 Page Ref: 361

5) Every DBMS product has an application programming interface (API).

Answer: TRUE

Diff: 1 Page Ref: 361

6) Every DBMS product uses the same API.

Answer: FALSE

Diff: 2 Page Ref: 361

7) ODBC stands for Open Database Connectivity.

Answer: TRUE

Diff: 1 Page Ref: 361

8) If a server is using a Microsoft Windows operating system, it is usually running Internet Information Server (IIS) as its Web server.

Answer: TRUE

Diff: 1 Page Ref: 361-363

9) The most commonly used Web server on servers running the UNIX or Linux operating system is Internet Information Server (IIS).

Answer: FALSE

Diff: 2 Page Ref: 361-363

10) If the Web server and the DBMS are running on the same server, the system has a three-tier architecture.

Answer: FALSE

Diff: 1 Page Ref: 363

11) ODBC is an industry standard interface between programming code and DBMS APIs.

Answer: TRUE

Diff: 2 Page Ref: 363-364

12) ODBC only works with Microsoft products.

Answer: FALSE

Diff: 2 Page Ref: 363-364

13) With ODBC, the driver manager serves as an intermediary between the application and the DBMS drivers.

Answer: TRUE

Diff: 1 Page Ref: 363-364

14) With ODBC, only a single driver is needed to handle all data source types, such as Oracle, DB2, and Access.

Answer: FALSE

Diff: 3 Page Ref: 363-364

15) With ODBC, a database and the DBMS that processes it are identified by the data source.

Answer: TRUE

Diff: 1 Page Ref: 363-364

16) With ODBC, a file data source is available only to the user that created it.

Answer: FALSE

Diff: 3 Page Ref: 363-364

17) In general, the best type of ODBC data source that can be defined for a Web application is a system data source.

Answer: TRUE

Diff: 3 Page Ref: 363-364

18) Basic Web pages are created using Hypertext Markup Language (HTML).

Answer: TRUE

Diff: 1 Page Ref: 370

19) HTML is defined as the World Wide Web Consortium (W3C).

Answer: TRUE

Diff: 2 Page Ref: 370

20) A common default Web page name recognized by most Web servers is FirstPage.html.

Answer: FALSE

Diff: 2 Page Ref: 370

21) Extensible Markup Language (XML) is becoming a standard means for defining the structure of documents and for transmitting documents from one computer to another.

Answer: TRUE

Diff: 1 Page Ref: 388

22) In XML, a document author can only use the predefined XML tags.

Answer: FALSE

Diff: 1 Page Ref: 388

23) XML provides a standardized, non-customizable way to describe the content of a document.

Answer: FALSE

Diff: 2 Page Ref: 389

24) XML designers created a system that allows document structure, data content, and materialization to be mixed.

Answer: FALSE

Diff: 3 Page Ref: 389

25) XML Web Services is a means for protecting and hiding elements of program functionality that otherwise would be available for misuse over the Web.

Answer: FALSE

Diff: 2 Page Ref: 389

26) When using Microsoft Access and IIS, the basic Web home page can be named index.html.

Answer: TRUE

Diff: 2 Page Ref: 392

27) When using Microsoft Access and IIS, a good basic ASCII text editor for producing HTML is FrontPage.

Answer: FALSE

Diff: 2 Page Ref: 392

28) When using Microsoft Access and IIS, there is no need for an ODBC data source.

Answer: FALSE

Diff: 2 Page Ref: 395

29) When using Microsoft Access and IIS, the ODBC data source should be a system data source.

Answer: TRUE

Diff: 2 Page Ref: 395

30) When using Microsoft Access and IIS, the Web pages that access the database cannot be written using PHP.

Answer: FALSE

Diff: 1 Page Ref: 395

31) Which of the following is not a type of trigger that can be invoked before DBMS insert, update, or delete actions?

  1. A) BEFORE triggers
  2. B) PREVIOUS triggers
  3. C) AFTER triggers
  4. D) INSTEAD OF triggers
  5. E) None of the above

Answer: B

Diff: 1 Page Ref: 361

32) Which of the following SQL commands cannot be used with a trigger?

  1. A) INSERT
  2. B) SELECT
  3. C) UPDATE
  4. D) DELETE
  5. E) Both B and D

Answer: B

Diff: 3 Page Ref: 361

33) Which of the following is true about stored procedures?

  1. A) Stored procedures cannot be passed parameters like a regular application function.
  2. B) Stored procedures are stored as an embedded function in the application program.
  3. C) Stored procedures are stored in the database.
  4. D) Stored procedures are invoked automatically by the DBMS when specific events occur.
  5. E) All of the above are true about stored procedures.

Answer: C

Diff: 3 Page Ref: 361

34) Every DBMS product has an API, which stands for:

  1. A) All Program Interpreter.
  2. B) All Program Interface.
  3. C) Application Programming Interpreter.
  4. D) Application Programming Interface.
  5. E) None of the above

Answer: D

Diff: 2 Page Ref: 361

35) ODBC stands for:

  1. A) Open Database Compatibility.
  2. B) Open Database Connectivity.
  3. C) Open-source Database Compatibility.
  4. D) Open-source Database Connectivity.
  5. E) None of the above

Answer: B

Diff: 2 Page Ref: 361

36) If the computer hosting the Web server is running a Windows operating system, the Web server is probably:

  1. A) Apache.
  2. B) Tomcat.
  3. C) Internet Information Server (IIS).
  4. D) Internet Interpreter Server (IIS).
  5. E) Information Interpreter Server (IIS).

Answer: C

Diff: 3 Page Ref: 361-363

37) If the computer hosting the Web server is running a UNIX or Linux operating system, the Web server is probably:

  1. A) Apache.
  2. B) Tomcat.
  3. C) Internet Information Server (IIS).
  4. D) Internet Interpreter Server (IIS).
  5. E) Information Interpreter Server (IIS).

Answer: A

Diff: 2 Page Ref: 361-363

38) According to the ODBC standard, which of the following is not part of the specification of a data source?

  1. A) The associated DBMS
  2. B) The database
  3. C) The driver
  4. D) The operating system
  5. E) The network platform

Answer: C

Diff: 2 Page Ref: 363-367

39) The ODBC standard defines a way to:

  1. A) start transactions.
  2. B) rollback transactions.
  3. C) create a connection.
  4. D) issue SQL commands.
  5. E) All of the above

Answer: E

Diff: 3 Page Ref: 363-367

40) Which of the following is a function performed by the driver manager in ODBC?

  1. A) Submit SQL statements to the data source.
  2. B) Determine the type of DBMS that processes a given ODBC data source.
  3. C) Load the appropriate ODBC driver into memory.
  4. D) Convert data source error codes into ODBC error codes.
  5. E) Both B and C

Answer: E

Diff: 1 Page Ref: 363-367

41) The intermediary between the application and the DBMS drivers in the ODBC architecture is the:

  1. A) driver manager.
  2. B) OLE DB interface.
  3. C) ODBC driver.
  4. D) data source.
  5. E) database connector.

Answer: A

Diff: 1 Page Ref: 363-367

42) Which of the following is a task performed by the driver according to the ODBC standard?

  1. A) Determines the appropriate DBMS
  2. B) Validates the format of the ODBC command received from the application
  3. C) Converts data source error codes into ODBC standard error codes
  4. D) Verifies the application to the data source
  5. E) Converts the data source into an SQL-compliant data structure

Answer: C

Diff: 2 Page Ref: 363-367

43) In PHP, any programming language statements that are to be processed on the server must be enclosed in:

  1. A) <!– and –!>.
  2. B) [php and php].
  3. C) (php and php).
  4. D) <?php and ?>.
  5. E) <server> and </server>.

Answer: D

Diff: 1 Page Ref: 374

44) The first PHP element to be created is the:

  1. A) Command object.
  2. B) Connection.
  3. C) Errors collection.
  4. D) Parameters collection.
  5. E) RecordSet object.

Answer: B

Diff: 2 Page Ref: 378

45) After trying to open a connection, a PHP connection to a DBMS needs to:

  1. A) open the connection.
  2. B) test the connection.
  3. C) query the database.
  4. D) process the query results.
  5. E) close the connection.

Answer: B

Diff: 2 Page Ref: 379

46) To get data after opening a connection, a PHP program needs to:

  1. A) open the connection.
  2. B) test the connection.
  3. C) query the database.
  4. D) process the query results.
  5. E) close the connection.

Answer: C

Diff: 2 Page Ref: 379

47) After getting data from a database, a PHP program needs to:

  1. A) open the connection.
  2. B) test the connection.
  3. C) query the database.
  4. D) process the query results.
  5. E) close the connection.

Answer: D

Diff: 2 Page Ref: 380

48) The final step of using a PHP connection to a DBMS is to:

  1. A) open the connection.
  2. B) test the connection.
  3. C) query the database.
  4. D) process the query results.
  5. E) close the connection.

Answer: E

Diff: 2 Page Ref: 380

49) XML stands for:

  1. A) Experimental Markup Language.
  2. B) Existential Markup Language.
  3. C) Extendable Markup Language.
  4. D) Extensible Markup Language.
  5. E) Extensible Marketing Language.

Answer: D

Diff: 1 Page Ref: 372

50) XML allows a programmer to:

  1. A) define elements.
  2. B) use only predefined elements.
  3. C) use only “shrink-warped,” purchased programs.
  4. D) Both A and B
  5. E) All of the above

Answer: A

Diff: 2 Page Ref: 387

51) When working with Microsoft Access on a Windows operating system, a simple but usable ASCII text editor is:

  1. A) Microsoft Word.
  2. B) Notepad.
  3. C) Wordpad.
  4. D) Microsoft Frontpage.
  5. E) Microsoft Visual Studio .NET.

Answer: B

Diff: 1 Page Ref: 392

52) Before running Web pages in Internet Information Server (IIS) against a Microsoft Access database, we need to create a(n):

  1. A) OBDC data source.
  2. B) JBDC data source.
  3. C) OLE DB data source.
  4. D) LAMP data source.
  5. E) WAMP data source.

Answer: A

Diff: 2 Page Ref: 394

53) When using an ODBC data source with IIS and Microsoft Access, we should use:

  1. A) a file data source.
  2. B) a system data source.
  3. C) a user data source.
  4. D) a LAMP data source.
  5. E) a WAMP data source.

Answer: B

Diff: 3 Page Ref: 396

54) When using Microsoft Access and IIS, a basic Web home page name that we should use even if we need to change IIS settings is:

  1. A) AWebPage.htm.
  2. B) index.html.
  3. C) MyWebPage.htm.
  4. D) MyWeb.htm.
  5. E) MyPage.htm.

Answer: B

Diff: 2 Page Ref: 392

55) When using Microsoft Access and IIS, we can create Web pages that access the database using the popular ________ scripting language.

  1. A) PHP
  2. B) DSN
  3. C) DSP
  4. D) JSN
  5. E) PSJ

Answer: A

Diff: 1 Page Ref: 395

56) A(n) ________ is a program stored within the DBMS that is invoked by the DBMS when a specified event occurs.

Answer: trigger

Diff: 1 Page Ref: 361

57) A(n) ________ is similar to a computer program subroutine or function, but it is stored within the database.

Answer: stored procedure

Diff: 1 Page Ref: 361

58) Every DBMS product has a(n) ________ that allows DBMS functions to be executed from application program code.

Answer: application programming interface (API)

Diff: 2 Page Ref: 361

59) ODBC stands for ________.

Answer: Open Database Connectivity

Diff: 1 Page Ref: 365

60) A commonly used Web server on servers running the Linux operating system is ________.

Answer: Apache

Diff: 2 Page Ref: 362

61) If the Web server and the DBMS are running on the different servers, the system has a(n) ________ architecture.

Answer: three-tier

Diff: 1 Page Ref: 363

62) According to the ODBC standard, a(n) ________ is a database and its associated DBMS, operating system, and network platform.

Answer: data source

Diff: 1 Page Ref: 366-367

63) With PHP, we enclose PHP commands in between the ________ and ________ symbols.

Answer: <?php, ?>

Diff: 2 Page Ref: 374

64) XML stands for ________.

Answer: Extensible Markup Language

Diff: 1 Page Ref: 372

65) Eclipse is a(n) ________.

Answer: Integrated Development Environment (IDE)

Diff: 1 Page Ref: 374

66) Even when using Microsoft Access and IIS, we should still use a basic Web home page named ________.

Answer: index.html

Diff: 2 Page Ref: 372

67) When using Microsoft Access and IIS, a good basic ASCII text editor for producing HTML is ________.

Answer: Notepad

Diff: 2 Page Ref: 392

68) When using Microsoft Access and IIS, the connection to the Access database must be provided by using a(n) ________.

Answer: ODBC data source

Diff: 2 Page Ref: 395

69) When using Microsoft Access and IIS with an ODBC data source, the ODBC data source should be a(n) ________.

Answer: system data source

Diff: 2 Page Ref: 395

70) When using Microsoft Access and IIS, the Web pages that access the database can be written using the ________ scripting language.

Answer: PHP

Diff: 1 Page Ref: 395

71) What is a trigger?

Answer: A trigger is a module of procedural logic that is written in a language provided by the DBMS and stored inside the database. The trigger is invoked automatically by the DBMS whenever certain events occur.

Diff: 1 Page Ref: 361

72) Briefly describe three types of triggers.

Answer: Common types of triggers include BEFORE triggers, AFTER triggers, and INSTEAD OF triggers. BEFORE triggers are modules of procedural logic that the DBMS automatically invokes before inserting, updating, or deleting data. An AFTER trigger is a module of procedural logic that the DBMS automatically invokes after inserting, updating, or deleting data. INSTEAD OF triggers are modules of procedural logic that the DBMS automatically invokes in place of inserting, updating, or deleting data.

Diff: 3 Page Ref: 361

73) What is a stored procedure?

Answer: A stored procedure is a module of procedural logic that is written in a language provided by the DBMS and stored inside the database. The stored procedure can be invoked, passed parameters, and return results just as a typical program function. Since the stored procedure is stored in the database, it is available to application programs, ASP or JSP pages, and interactive queries.

Diff: 1 Page Ref: 361

74) What are the common differences between a Web database processing system running on the Windows operating system and one running on a Linux operating system?

Answer: If a Web server is running the Windows operating system, the Web server software will usually be Internet Information Server (IIS) and the Web pages may use ASP pages to integrate application logic with HTML. If a Web server is running the Linux operating system, the Web server software will usually be Apache, the database will typically be MySQL, and the Web pages may use PHP and Pearl to integrate application logic with HTML. This combination is called LAMP. Note that Apache, MySQL and PHP/Pearl can run on a Windows systems, in which case the combination is referred to as WAMP

Diff: 2 Page Ref: 361-363

75) What is a three-tier architecture?

Answer: The term tier refers to each different computer that runs a portion of a Web database processing environment. The user’s browser running on the user’s own computer is one tier, and a Web server running on another computer is another tier. If the DBMS supporting the Web application runs on yet another computer, there is a third tier, and the computer environment is referred to as a three-tier architecture.

Diff: 2 Page Ref: 363

76) Define and briefly describe the function of ODBC.

Answer: ODBC stands for Open Database Connectivity. It is used to solve the problem caused by each DBMS having its own proprietary application program interface (API). OBDC was created to be a bridge between program code and the APIs. A programmer can write code using ODBC standard statements, and an ODBC driver translates these statements into a form that the DBMS API can understand. Similarly, results sent though the API back to OBDC are translated into standard ODBC forms. This allows application programmers to write to OBDC as a common interface rather than having to learn many APIs.

Diff: 2 Page Ref: 363-367

77) Briefly describe PHP.

Answer: PHP, which is an abbreviation for PHP: Hypertext Processor, is a popular scripting language that can be embedded in Web pages. PHP allows users to connect to databases, run SQL commands against the databases, and then process the results of the SQL commands for display on Web pages. PHP commands are enclosed in <?php and ?> elements.

Diff: 1 Page Ref: 373-380

78) What is XML, and why is it useful?

Answer: XML stands for Extensible Markup Language. XML is a markup language like HTTP, but it allows users to define their own tags. XML is used to define the structure of documents and for transmitting documents between computers. It is important for database processing because it provides a standardized means of sending and receiving data to and from a database.

Diff: 2 Page Ref: 374, 388-391

79) What is the Eclipse PDT?

Answer: Eclipse is an open-source Integrated Development Environment (IDE), which means it contains all the tools a developer needs for development projects. The Eclipse PDT is a version of Eclipse that is intended for use in PHP development .

Diff: 2 Page Ref: 383-388

80) How can XML be used with a DBMS?

Answer: One example is the use of XML with SQL Server. Here we use the SQL FOR XML clause to retrieve XML data from the database. The query results are returned to a single cell. This output can be expanded and copied to other documents.

Diff: 2 Page Ref: 388-391

81) What are XML Web Services?

Answer: XML Web Services is a means for sharing program elements over the Web. It involves several standards, including XML, SOAP, WSDL and UDDI. An example would be a database application that retrieves and produces weather forecasts based on ZIP code. Using XML Web services, this application could be published so that it can be embedded in various Web pages. Users of those Web pages would then actually be using this application without realizing that it is separate from the Web page.

Diff: 2 Page Ref: 391

82) Describe how to use Microsoft Access and IIS in Web database processing applications.

Answer: When using Microsoft Access and IIS to create Web processing applications, the connection to the Access database must be provided by using an ODBC data source. The ODBC data source should be a system data source. The Web pages that access the database can use various technologies, including the popular PHP scripting language.

Diff: 1 Page Ref: 391-398

+
-
Only 0 units of this product remain

You might also be interested in