Diff: 2 Page Ref: 347
62) Microsoft Access 2010 can secure database files by storing them in a(n) ________.
Answer: trusted location
Diff: 2 Page Ref: 329
63) Microsoft Access 2010 can secure databases by using ________ to encrypt and decrypt the database files.
Answer: passwords
Diff: 3 Page Ref: 336
64) Microsoft Access 2010 can secure databases by deploying databases packaged with a(n) ________.
Answer: digital signature
Diff: 2 Page Ref: 342
65) When Microsoft Access 2010 compiles VBA code in a database, the resulting file is stored using a(n) ________ file extension.
Answer: *.accde
Diff: 2 Page Ref: 342
66) What database administration functions help bring order to the potential chaos of the database processing environment?
Answer: First, the actions of concurrent users must be controlled so that consistent results are obtained. Second, security measures are necessary so that only authentic users who are properly authorized are permitted to take appropriate actions on databases. Finally, backup and recovery techniques and procedures must be in place to protect databases and the data they contain.
Diff: 1 Page Ref: 303-304
67) Explain the concept of an “atomic transaction.”
Answer: An atomic transaction is a transaction in which either all steps must be completed successfully, or none of the steps can be completed at all. A transaction becomes atomic when the complete set of steps within the transaction is a single logical unit of work.
Diff: 1 Page Ref: 306-307
68) Briefly define the three problems that can occur because of concurrent processing that are addressed by resource locking.
Answer: The three problems that can occur because of concurrent processing are dirty reads, nonrepeatable reads, and phantom reads. A dirty read occurs when a transaction reads a changed record that has not been committed to the database. If the change is cancelled before it is committed, then the read will contain incorrect data. A nonrepeatable read occurs when a transaction rereads data and finds modifications or deletions caused by another transaction. A phantom read occurs when a transaction rereads data and finds new rows that were inserted by another transaction since the prior read.
Diff: 2 Page Ref: 309
69) Briefly explain the strategy of two-phased locking.
Answer: Two-phased locking is a strategy to ensure the serializability of transactions. A transaction is allowed to obtain locks as necessary, but once the first lock is released, no other locks may be obtained. This produces the two-phased effect—the growing phase in which locks are obtained and the shrinking phase as locks are released.
Diff: 2 Page Ref: 310-311
70) Explain the process of using optimistic locking.
Answer: Optimistic locking makes the assumption that no conflicts will occur. Data is read, the transaction is processed, updates are issued, and then a check is made to see if a conflict occurred. If a conflict does occur, the transaction is repeated until it completes without a conflict. Thus, the lock is not secured until the transaction is completed. This reduces the amount of time that the lock is held.
Diff: 2 Page Ref: 311-312
71) Distinguish between statement-level consistency and transaction-level consistency.
Answer: Statement-level consistency requires that a statement apply to a set of rows that is consistent from the beginning of the statement until the end of the statement. Transaction-level consistency indicates that the set of rows will remain consistent throughout the processing of all statements within the transaction.
Diff: 2 Page Ref: 313-314
72) What are the four transaction isolation levels?
Answer: The four levels of isolation are Read Uncommitted, Read Committed, Repeatable Read, and Serializable. Read Uncommitted is the least restrictive, and it produces reads that are susceptible to dirty reads, nonrepeatable reads, and phantom reads. Read Committed isolation prevents dirty reads by only reading committed changes. Repeatable Read isolation prevents dirty reads and nonrepeatable reads. Serializable is the most restrictive level of isolation, and it prevents dirty reads, nonrepeatable reads, and phantom reads.
Diff: 3 Page Ref: 314-315
73) What is the difference between authentication and authorization?
Answer: Authentication refers to making sure a user has the right to use the computer system in the first place. It is the precursor to authorization, which is assigning an authenticated user permission to perform specific tasks on the system. Both are need for effective computer system security.
Diff: 2 Page Ref: 317
74) Why do computers fail?
Answer: Computers fail for a variety of reasons, including (1) hardware failure, (2) electrical power outages, (3) bugs in computer programs, (4) errors in procedures, and (5) human error.
Diff: 2 Page Ref: 323
75) Distinguish between reprocessing and rollforward as database recovery techniques.
Answer: Reprocessing and rollforward both require the use of database saves, which are backups of the database at a known state. Reprocessing as a means of recovery involves recovering the database from the last database save and having the application programs reprocess all the transactions since the save. Rollforward as a means of recovery involves recovering the database from the last save and then reapplying all changes to the database. Reprocessing does not always reproduce the original database contents correctly since minute changes in processing by the application programs may result in changes in data manipulation.
Diff: 3 Page Ref: 323-326
76) Discuss Microsoft Access 2010 security administration.
Answer: Microsoft Access 2010 files can be secured using three methods: (1) by creating trusted locations for file storage, (2) by password encryption and decryption of database files, and (3) by deploying databases packaged with a digital signature. Additionally, Microsoft Access 2010 can compile VBA code used with an Access 2007 database file. Finally Microsoft Access 2010 can still use user-level security for older *.mdb database files (but not for Access 2010 *.accdb files). User-level security settings are stored in workgroup information files (*.mdw).
Diff: 3 Page Ref: 328-347
Database Concepts, 6e (Kroenke/Auer)
Chapter 7 Database Processing Applications
1) A trigger is an event stored in a database that is invoked by the DBMS when specified events occur.
Answer: TRUE
Diff: 1 Page Ref: 361
2) A BEFORE trigger is called by the DBMS before reading data.
Answer: FALSE
Diff: 2 Page Ref: 361
3) A stored procedure is a module of logic normally written in a traditional programming language like C++ and stored in the application program.
Answer: FALSE
Diff: 2 Page Ref: 361
4) A stored procedure is invoked automatically by the DBMS whenever certain events occur.
Answer: FALSE
Diff: 1 Page Ref: 361
5) Every DBMS product has an application programming interface (API).
Answer: TRUE
Diff: 1 Page Ref: 361
6) Every DBMS product uses the same API.
Answer: FALSE
Diff: 2 Page Ref: 361
7) ODBC stands for Open Database Connectivity.
Answer: TRUE
Diff: 1 Page Ref: 361
8) If a server is using a Microsoft Windows operating system, it is usually running Internet Information Server (IIS) as its Web server.
Answer: TRUE
Diff: 1 Page Ref: 361-363
9) The most commonly used Web server on servers running the UNIX or Linux operating system is Internet Information Server (IIS).
Answer: FALSE
Diff: 2 Page Ref: 361-363
10) If the Web server and the DBMS are running on the same server, the system has a three-tier architecture.
Answer: FALSE
Diff: 1 Page Ref: 363
11) ODBC is an industry standard interface between programming code and DBMS APIs.
Answer: TRUE
Diff: 2 Page Ref: 363-364
12) ODBC only works with Microsoft products.
Answer: FALSE
Diff: 2 Page Ref: 363-364
13) With ODBC, the driver manager serves as an intermediary between the application and the DBMS drivers.
Answer: TRUE
Diff: 1 Page Ref: 363-364
14) With ODBC, only a single driver is needed to handle all data source types, such as Oracle, DB2, and Access.
Answer: FALSE
Diff: 3 Page Ref: 363-364
15) With ODBC, a database and the DBMS that processes it are identified by the data source.
Answer: TRUE
Diff: 1 Page Ref: 363-364
16) With ODBC, a file data source is available only to the user that created it.
Answer: FALSE
Diff: 3 Page Ref: 363-364
17) In general, the best type of ODBC data source that can be defined for a Web application is a system data source.
Answer: TRUE
Diff: 3 Page Ref: 363-364
18) Basic Web pages are created using Hypertext Markup Language (HTML).
Answer: TRUE
Diff: 1 Page Ref: 370
19) HTML is defined as the World Wide Web Consortium (W3C).
Answer: TRUE
Diff: 2 Page Ref: 370
20) A common default Web page name recognized by most Web servers is FirstPage.html.
Answer: FALSE
Diff: 2 Page Ref: 370
21) Extensible Markup Language (XML) is becoming a standard means for defining the structure of documents and for transmitting documents from one computer to another.
Answer: TRUE
Diff: 1 Page Ref: 388
22) In XML, a document author can only use the predefined XML tags.
Answer: FALSE
Diff: 1 Page Ref: 388
23) XML provides a standardized, non-customizable way to describe the content of a document.
Answer: FALSE
Diff: 2 Page Ref: 389
24) XML designers created a system that allows document structure, data content, and materialization to be mixed.
Answer: FALSE
Diff: 3 Page Ref: 389
25) XML Web Services is a means for protecting and hiding elements of program functionality that otherwise would be available for misuse over the Web.
Answer: FALSE
Diff: 2 Page Ref: 389
26) When using Microsoft Access and IIS, the basic Web home page can be named index.html.
Answer: TRUE
Diff: 2 Page Ref: 392
27) When using Microsoft Access and IIS, a good basic ASCII text editor for producing HTML is FrontPage.
Answer: FALSE
Diff: 2 Page Ref: 392
28) When using Microsoft Access and IIS, there is no need for an ODBC data source.
Answer: FALSE
Diff: 2 Page Ref: 395
29) When using Microsoft Access and IIS, the ODBC data source should be a system data source.
Answer: TRUE
Diff: 2 Page Ref: 395
30) When using Microsoft Access and IIS, the Web pages that access the database cannot be written using PHP.
Answer: FALSE
Diff: 1 Page Ref: 395
31) Which of the following is not a type of trigger that can be invoked before DBMS insert, update, or delete actions?
- A) BEFORE triggers
- B) PREVIOUS triggers
- C) AFTER triggers
- D) INSTEAD OF triggers
- E) None of the above
Answer: B
Diff: 1 Page Ref: 361
32) Which of the following SQL commands cannot be used with a trigger?
- A) INSERT
- B) SELECT
- C) UPDATE
- D) DELETE
- E) Both B and D
Answer: B
Diff: 3 Page Ref: 361
33) Which of the following is true about stored procedures?
- A) Stored procedures cannot be passed parameters like a regular application function.
- B) Stored procedures are stored as an embedded function in the application program.
- C) Stored procedures are stored in the database.
- D) Stored procedures are invoked automatically by the DBMS when specific events occur.
- E) All of the above are true about stored procedures.
Answer: C
Diff: 3 Page Ref: 361
34) Every DBMS product has an API, which stands for:
- A) All Program Interpreter.
- B) All Program Interface.
- C) Application Programming Interpreter.
- D) Application Programming Interface.
- E) None of the above
Answer: D
Diff: 2 Page Ref: 361
35) ODBC stands for:
- A) Open Database Compatibility.
- B) Open Database Connectivity.
- C) Open-source Database Compatibility.
- D) Open-source Database Connectivity.
- E) None of the above
Answer: B
Diff: 2 Page Ref: 361
36) If the computer hosting the Web server is running a Windows operating system, the Web server is probably:
- A) Apache.
- B) Tomcat.
- C) Internet Information Server (IIS).
- D) Internet Interpreter Server (IIS).
- E) Information Interpreter Server (IIS).
Answer: C
Diff: 3 Page Ref: 361-363
37) If the computer hosting the Web server is running a UNIX or Linux operating system, the Web server is probably:
- A) Apache.
- B) Tomcat.
- C) Internet Information Server (IIS).
- D) Internet Interpreter Server (IIS).
- E) Information Interpreter Server (IIS).
Answer: A
Diff: 2 Page Ref: 361-363
38) According to the ODBC standard, which of the following is not part of the specification of a data source?
- A) The associated DBMS
- B) The database
- C) The driver
- D) The operating system
- E) The network platform
Answer: C
Diff: 2 Page Ref: 363-367
39) The ODBC standard defines a way to:
- A) start transactions.
- B) rollback transactions.
- C) create a connection.
- D) issue SQL commands.
- E) All of the above
Answer: E
Diff: 3 Page Ref: 363-367
40) Which of the following is a function performed by the driver manager in ODBC?
- A) Submit SQL statements to the data source.
- B) Determine the type of DBMS that processes a given ODBC data source.
- C) Load the appropriate ODBC driver into memory.
- D) Convert data source error codes into ODBC error codes.
- E) Both B and C
Answer: E
Diff: 1 Page Ref: 363-367
41) The intermediary between the application and the DBMS drivers in the ODBC architecture is the:
- A) driver manager.
- B) OLE DB interface.
- C) ODBC driver.
- D) data source.
- E) database connector.
Answer: A
Diff: 1 Page Ref: 363-367
42) Which of the following is a task performed by the driver according to the ODBC standard?
- A) Determines the appropriate DBMS
- B) Validates the format of the ODBC command received from the application
- C) Converts data source error codes into ODBC standard error codes
- D) Verifies the application to the data source
- E) Converts the data source into an SQL-compliant data structure
Answer: C
Diff: 2 Page Ref: 363-367
43) In PHP, any programming language statements that are to be processed on the server must be enclosed in:
- A) <!– and –!>.
- B) [php and php].
- C) (php and php).
- D) <?php and ?>.
- E) <server> and </server>.
Answer: D
Diff: 1 Page Ref: 374
44) The first PHP element to be created is the:
- A) Command object.
- B) Connection.
- C) Errors collection.
- D) Parameters collection.
- E) RecordSet object.
Answer: B
Diff: 2 Page Ref: 378
45) After trying to open a connection, a PHP connection to a DBMS needs to:
- A) open the connection.
- B) test the connection.
- C) query the database.
- D) process the query results.
- E) close the connection.
Answer: B
Diff: 2 Page Ref: 379
46) To get data after opening a connection, a PHP program needs to:
- A) open the connection.
- B) test the connection.
- C) query the database.
- D) process the query results.
- E) close the connection.
Answer: C
Diff: 2 Page Ref: 379
47) After getting data from a database, a PHP program needs to:
- A) open the connection.
- B) test the connection.
- C) query the database.
- D) process the query results.
- E) close the connection.
Answer: D
Diff: 2 Page Ref: 380
48) The final step of using a PHP connection to a DBMS is to:
- A) open the connection.
- B) test the connection.
- C) query the database.
- D) process the query results.
- E) close the connection.
Answer: E
Diff: 2 Page Ref: 380
49) XML stands for:
- A) Experimental Markup Language.
- B) Existential Markup Language.
- C) Extendable Markup Language.
- D) Extensible Markup Language.
- E) Extensible Marketing Language.
Answer: D
Diff: 1 Page Ref: 372
50) XML allows a programmer to:
- A) define elements.
- B) use only predefined elements.
- C) use only “shrink-warped,” purchased programs.
- D) Both A and B
- E) All of the above
Answer: A
Diff: 2 Page Ref: 387
51) When working with Microsoft Access on a Windows operating system, a simple but usable ASCII text editor is:
- A) Microsoft Word.
- B) Notepad.
- C) Wordpad.
- D) Microsoft Frontpage.
- E) Microsoft Visual Studio .NET.
Answer: B
Diff: 1 Page Ref: 392
52) Before running Web pages in Internet Information Server (IIS) against a Microsoft Access database, we need to create a(n):
- A) OBDC data source.
- B) JBDC data source.
- C) OLE DB data source.
- D) LAMP data source.
- E) WAMP data source.
Answer: A
Diff: 2 Page Ref: 394
53) When using an ODBC data source with IIS and Microsoft Access, we should use:
- A) a file data source.
- B) a system data source.
- C) a user data source.
- D) a LAMP data source.
- E) a WAMP data source.
Answer: B
Diff: 3 Page Ref: 396
54) When using Microsoft Access and IIS, a basic Web home page name that we should use even if we need to change IIS settings is:
- A) AWebPage.htm.
- B) index.html.
- C) MyWebPage.htm.
- D) MyWeb.htm.
- E) MyPage.htm.
Answer: B
Diff: 2 Page Ref: 392
55) When using Microsoft Access and IIS, we can create Web pages that access the database using the popular ________ scripting language.
- A) PHP
- B) DSN
- C) DSP
- D) JSN
- E) PSJ
Answer: A
Diff: 1 Page Ref: 395
56) A(n) ________ is a program stored within the DBMS that is invoked by the DBMS when a specified event occurs.
Answer: trigger
Diff: 1 Page Ref: 361
57) A(n) ________ is similar to a computer program subroutine or function, but it is stored within the database.
Answer: stored procedure
Diff: 1 Page Ref: 361
58) Every DBMS product has a(n) ________ that allows DBMS functions to be executed from application program code.
Answer: application programming interface (API)
Diff: 2 Page Ref: 361
59) ODBC stands for ________.
Answer: Open Database Connectivity
Diff: 1 Page Ref: 365
60) A commonly used Web server on servers running the Linux operating system is ________.
Answer: Apache
Diff: 2 Page Ref: 362
61) If the Web server and the DBMS are running on the different servers, the system has a(n) ________ architecture.
Answer: three-tier
Diff: 1 Page Ref: 363
62) According to the ODBC standard, a(n) ________ is a database and its associated DBMS, operating system, and network platform.
Answer: data source
Diff: 1 Page Ref: 366-367
63) With PHP, we enclose PHP commands in between the ________ and ________ symbols.
Answer: <?php, ?>
Diff: 2 Page Ref: 374
64) XML stands for ________.
Answer: Extensible Markup Language
Diff: 1 Page Ref: 372
65) Eclipse is a(n) ________.
Answer: Integrated Development Environment (IDE)
Diff: 1 Page Ref: 374
66) Even when using Microsoft Access and IIS, we should still use a basic Web home page named ________.
Answer: index.html
Diff: 2 Page Ref: 372
67) When using Microsoft Access and IIS, a good basic ASCII text editor for producing HTML is ________.
Answer: Notepad
Diff: 2 Page Ref: 392
68) When using Microsoft Access and IIS, the connection to the Access database must be provided by using a(n) ________.
Answer: ODBC data source
Diff: 2 Page Ref: 395
69) When using Microsoft Access and IIS with an ODBC data source, the ODBC data source should be a(n) ________.
Answer: system data source
Diff: 2 Page Ref: 395
70) When using Microsoft Access and IIS, the Web pages that access the database can be written using the ________ scripting language.
Answer: PHP
Diff: 1 Page Ref: 395
71) What is a trigger?
Answer: A trigger is a module of procedural logic that is written in a language provided by the DBMS and stored inside the database. The trigger is invoked automatically by the DBMS whenever certain events occur.
Diff: 1 Page Ref: 361
72) Briefly describe three types of triggers.
Answer: Common types of triggers include BEFORE triggers, AFTER triggers, and INSTEAD OF triggers. BEFORE triggers are modules of procedural logic that the DBMS automatically invokes before inserting, updating, or deleting data. An AFTER trigger is a module of procedural logic that the DBMS automatically invokes after inserting, updating, or deleting data. INSTEAD OF triggers are modules of procedural logic that the DBMS automatically invokes in place of inserting, updating, or deleting data.
Diff: 3 Page Ref: 361
73) What is a stored procedure?
Answer: A stored procedure is a module of procedural logic that is written in a language provided by the DBMS and stored inside the database. The stored procedure can be invoked, passed parameters, and return results just as a typical program function. Since the stored procedure is stored in the database, it is available to application programs, ASP or JSP pages, and interactive queries.
Diff: 1 Page Ref: 361
74) What are the common differences between a Web database processing system running on the Windows operating system and one running on a Linux operating system?
Answer: If a Web server is running the Windows operating system, the Web server software will usually be Internet Information Server (IIS) and the Web pages may use ASP pages to integrate application logic with HTML. If a Web server is running the Linux operating system, the Web server software will usually be Apache, the database will typically be MySQL, and the Web pages may use PHP and Pearl to integrate application logic with HTML. This combination is called LAMP. Note that Apache, MySQL and PHP/Pearl can run on a Windows systems, in which case the combination is referred to as WAMP
Diff: 2 Page Ref: 361-363
75) What is a three-tier architecture?
Answer: The term tier refers to each different computer that runs a portion of a Web database processing environment. The user’s browser running on the user’s own computer is one tier, and a Web server running on another computer is another tier. If the DBMS supporting the Web application runs on yet another computer, there is a third tier, and the computer environment is referred to as a three-tier architecture.
Diff: 2 Page Ref: 363
76) Define and briefly describe the function of ODBC.
Answer: ODBC stands for Open Database Connectivity. It is used to solve the problem caused by each DBMS having its own proprietary application program interface (API). OBDC was created to be a bridge between program code and the APIs. A programmer can write code using ODBC standard statements, and an ODBC driver translates these statements into a form that the DBMS API can understand. Similarly, results sent though the API back to OBDC are translated into standard ODBC forms. This allows application programmers to write to OBDC as a common interface rather than having to learn many APIs.
Diff: 2 Page Ref: 363-367
77) Briefly describe PHP.
Answer: PHP, which is an abbreviation for PHP: Hypertext Processor, is a popular scripting language that can be embedded in Web pages. PHP allows users to connect to databases, run SQL commands against the databases, and then process the results of the SQL commands for display on Web pages. PHP commands are enclosed in <?php and ?> elements.
Diff: 1 Page Ref: 373-380
78) What is XML, and why is it useful?
Answer: XML stands for Extensible Markup Language. XML is a markup language like HTTP, but it allows users to define their own tags. XML is used to define the structure of documents and for transmitting documents between computers. It is important for database processing because it provides a standardized means of sending and receiving data to and from a database.
Diff: 2 Page Ref: 374, 388-391
79) What is the Eclipse PDT?
Answer: Eclipse is an open-source Integrated Development Environment (IDE), which means it contains all the tools a developer needs for development projects. The Eclipse PDT is a version of Eclipse that is intended for use in PHP development .
Diff: 2 Page Ref: 383-388
80) How can XML be used with a DBMS?
Answer: One example is the use of XML with SQL Server. Here we use the SQL FOR XML clause to retrieve XML data from the database. The query results are returned to a single cell. This output can be expanded and copied to other documents.
Diff: 2 Page Ref: 388-391
81) What are XML Web Services?
Answer: XML Web Services is a means for sharing program elements over the Web. It involves several standards, including XML, SOAP, WSDL and UDDI. An example would be a database application that retrieves and produces weather forecasts based on ZIP code. Using XML Web services, this application could be published so that it can be embedded in various Web pages. Users of those Web pages would then actually be using this application without realizing that it is separate from the Web page.
Diff: 2 Page Ref: 391
82) Describe how to use Microsoft Access and IIS in Web database processing applications.
Answer: When using Microsoft Access and IIS to create Web processing applications, the connection to the Access database must be provided by using an ODBC data source. The ODBC data source should be a system data source. The Web pages that access the database can use various technologies, including the popular PHP scripting language.
Diff: 1 Page Ref: 391-398