Skip to main content

INF503 Week 5 Quize's

 Skip to main content

Started onSunday, February 13, 2022, 11:16 PM
StateFinished
Completed onSunday, February 13, 2022, 11:19 PM
Time taken3 mins 9 secs
Grade20.00 out of 20.00 (100%)

Question 1

Correct
1.00 points out of 1.00
Flag question

Question text

_____ can render data useless to unauthorized users who might have violated some of the database security layers.
Select one:
a.
Data encryption
Correct
b.
Access rights
c.
Physical security
d.
Password security

Feedback

Question 2

Correct
1.00 points out of 1.00
Flag question

Question text

_____ are required to prevent another transaction form reading inconsistent data.
Select one:
a.
Locks
Correct
b.
Schedules
c.
Logs
d.
Stamps

Feedback

Question 3

Correct
1.00 points out of 1.00
Flag question

Question text

_____ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
Select one:
a.
Time stamping
b.
Serializability 
c.
Isolation
Correct
d.
Atomicity

Feedback

Question 4

Correct
1.00 points out of 1.00
Flag question

Question text

_____ occurs when a transaction accesses data before and after one or more other transactions finish working with such data. 
Select one:
a.
Inconsistent retrieval 
Correct
b.
Dirty read problems
c.
The phenomena of uncommitted data
d.
Lost update problems

Feedback

Question 5

Correct
1.00 points out of 1.00
Flag question

Question text

_____ requires that all operations of a transaction be completed.
Select one:
a.
Durability
b.
Specificity
c.
Time stamping
d.
Atomicity
Correct

Feedback

Question 6

Correct
1.00 points out of 1.00
Flag question

Question text

A _____ lock allows concurrent transactions to access different rows of the same table.
Select one:
a.
database table
b.
row-level
Correct
c.
page-level
d.
table-level

Feedback

Question 7

Correct
1.00 points out of 1.00
Flag question

Question text

A _____ lock will lock the entire diskpage.
Select one:
a.
page-level
Correct
b.
table-level
c.
row-level
d.
transaction-level

Feedback

Question 8

Correct
1.00 points out of 1.00
Flag question

Question text

A _____ lock will lock the entire table, preventing access to any row by a transaction while another transaction is using the table.
Select one:
a.
database-level
b.
row-level
c.
page-level
d.
table-level
Correct

Feedback

Question 9

Correct
1.00 points out of 1.00
Flag question

Question text

A consistent database state is one in which all _____.
Select one:
a.
SQL statements only update one table at a time
b.
data integrity constraints are satisfied
Correct
c.
table are normalized
d.
tables have foreign keys

Feedback

Question 10

Correct
1.00 points out of 1.00
Flag question

Question text

A diskpage, or page, is the equivalent of a _____.
Select one:
a.
diskblock
Correct
b.
disk sector
c.
database schema
d.
database table

Feedback

Question 11

Correct
1.00 points out of 1.00
Flag question

Question text

A single-user database system automatically ensures_____ of the database, because only one transaction is executed at a time.
Select one:
a.
serializability and isolation
Correct
b.
serializability and durability 
c.
atomicity and isolation
d.
atomicity and serializability

Feedback

Question 12

Correct
1.00 points out of 1.00
Flag question

Question text

_____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources. 
Select one:
a.
Generalization
b.
Normalization
c.
Specialization
d.
Virtualization
Correct

Feedback

Question 13

Correct
1.00 points out of 1.00
Flag question

Question text

_____ is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance. 
Select one:
a.
Network design
b.
Logical design
c.
Conceptual design
d.
Physical design
Correct

Feedback

Question 14

Correct
1.00 points out of 1.00
Flag question

Question text

"Should the existing system be replaced?" is a question that is asked during the _____ stage of the Systems Development Life Cycle (SDLC).
Select one:
a.
maintenance
b.
implementation
c.
planning
Correct
d.
analysis

Feedback

Question 15

Correct
1.00 points out of 1.00
Flag question

Question text

"What are the requirements of the current system's end users?" is a question asked during the _____ phase of the Systems Development Life Cycle (SDLC).
Select one:
a.
analysis
Correct
b.
implementation
c.
planning
d.
maintenance

Feedback

Question 16

Correct
1.00 points out of 1.00
Flag question

Question text

Coding, testing, and debugging are part of the _____ phase of the Systems Development Life Cycle (SDLC).
Select one:
a.
planning
b.
analysis
c.
implementation
Correct
d.
detailed systems design

Feedback

Question 17

Correct
1.00 points out of 1.00
Flag question

Question text

Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC).
Select one:
a.
planning
b.
implementation
c.
detailed systems design
d.
analysis
Correct

Feedback

Question 18

Correct
1.00 points out of 1.00
Flag question

Question text

During decentralized design, after the _____ has been completed, all modules are integrated into one conceptual model.
Select one:
a.
declaration process
b.
verification process
Correct
c.
logical process
d.
conceptual process

Feedback

Question 19

Correct
1.00 points out of 1.00
Flag question

Question text

During the _____ phase of the Systems Development Life Cycle (SDLC), the hardware, database management system (DBMS) software, and application programs are installed, and the database design is implemented.
Select one:
a.
detailed systems design
b.
analysis
c.
maintenance
d.
 implementation
Correct

Feedback

Question 20

Correct
1.00 points out of 1.00
Flag question

Question text

In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up.
Select one:
a.
conservative backup 
b.
differential backup
Correct
c.
transaction log backup
d.
adaptive backup

Feedback











































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh