Contents

Recovering a database via reprocessing involves………..
a) restoring database and reprocessing
b) restoring database and reapplying
c) undoing changes made erroneous              
d) recreating database

a

Which of the following is not true of DBMS security features?
a) users may be assigned to one or more
b) a role may be assigned
c) users and roles can have many permissions
d) objects have many permissions

b

Recovering a database via roll forward involves………..
a) restoring database and reprocessing
b) restoring database and reapplying
c) undoing changes made erroneous              
d) recreating database

b

Recovering a database via reprocessing involves………..
a) restoring database and reprocessing
b) restoring database and reapplying
c) undoing changes made erroneous
d) recreating database

c

Which of the following would not be contained in a transaction log?
a) before images 
b) type of operation
c) pointers                            

d) permissions

d

Copies of each database record or page before it was changed by a transaction that are saved for use in database recovery are called…..
a) before images

b) type of operation
c) pointers                            

d) time of action

a