Looking for DMBS.ig test answers and solutions? Browse our comprehensive collection of verified answers for DMBS.ig at moodle.cs.ubbcluj.ro.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
::Stored procedures can be used to perform CRUD operations in most database management systems::Stored procedures can be used to perform CRUD operations in most database management systems {T}
::ORM::It is possible to perform CRUD operations in a relational database without using an Object-Relational Mapping (ORM) {T}
::Database Cache::Cache can be used to reduce the number of requests to the database and improve CRUD operations performance {T}
::Indexing in databases can improve the performance of read operations from the database::Indexing in databases can improve the performance of read operations from the database {T}
::Database Performance::There is a risk that CRUD operations could lead to database overuse and poor performance in applications with high traffic volume {T}
::CRUD stands for "Create, Read, Update, Delete"::CRUD stands for "Create, Read, Update, Delete" {T}
::JavaScript is a programming language that can be used to perform CRUD operations::JavaScript is a programming language that can be used to perform CRUD operations {T}
::Stored procedures in the database can be used to perform CRUD operations::Stored procedures in the database can be used to perform CRUD operations {T}
::CRUD operations are used only in web application development::CRUD operations are used only in web application development {F}
::JDBC (Java Database Connectivity) is used to interact with databases in Java::JDBC (Java Database Connectivity) is used to interact with databases in Java {T}
::Trigger Functionality::A trigger in a database can be used to automatically respond to certain events, such as inserting or deleting a record {T}
::Replication Support::Database management systems support replication, allowing data replication between multiple database nodes {T}
::Database management are systems that support data encryption::Database management are systems that support data encryption {T}
::Database Engine Definition::A database engine is the software that manages the storage, access, and manipulation of data in a database {T}
::Backup and Recovery Mechanisms::Backup and recovery mechanisms in database management systems allow data restoration in case of failure {T}
::Stored procedures in the database are used exclusively to manage user interaction::Stored procedures in the database are used exclusively to manage user interaction {F}
::Denormalized Data Modeling::Denormalized data modeling is not recommended for all types of applications based on relational databases {F}
::Indexing in databases is used exclusively to manage data access security::Indexing in databases is used exclusively to manage data access security {F}
::A distributed database is used exclusively to store data in a single central node::A distributed database is used exclusively to store data in a single central node {F}
::A trigger in a database is used exclusively to manage data security::A trigger in a database is used exclusively to manage data security {F}
::Suspended is an attribute that does not represent a valid state of a transaction::Suspended is an attribute that does not represent a valid state of a transaction {T}
::Active is an attribute that represents a valid state of a transaction::Active is an attribute that represents a valid state of a transaction {T}
::Commited is an attribute that does not represent a valid state of a transaction::Commited is an attribute that does not represent a valid state of a transaction {F}
::Aborted is an attribute that does not represent a valid state of a transaction::Aborted is an attribute that does not represent a valid state of a transaction {F}
::Defining Unrepeatable Read Anomaly: Consistent Object Values::The Concurrent Execution Anomaly Unrepeatable Read refers to: two consecutive reads of the same object yield different values {T}
::Unrepeatable Read Anomaly: Inconsistent Record Counts::The Concurrent Execution Anomaly Unrepeatable Read refers to: two consecutive selections, the number of returned records differs {F}
::Unrepeatable Read Anomaly: Retained Object Values::The Concurrent Execution Anomaly Unrepeatable Read refers to: two consecutive modifications of the same object retain the first assigned value {F}
::Unrepeatable Read Anomaly: Exceptional Object Read Behavior::The Concurrent Execution Anomaly Unrepeatable Read refers to: throwing an exception on the second read of an object {F}
::Primary horizontal data fragmentation is the first fragmentation applied to a table::Primary horizontal data fragmentation is the first fragmentation applied to a table {T}
::Ensuring Consistency in Serializable Execution Plans::Serializable execution plans ensure that the results of concurrent transactions are identical to those of a serial sequence {T}
::Serializable Execution Plans: Consistency Assurance::Serializable execution plans do not ensure that the results of concurrent transactions are identical to those of a serial sequence {F}
::ACID properties are essential for ensuring data consistency in serializable execution plans::ACID properties are essential for ensuring data consistency in serializable execution plans {T}
::ACID properties are not important for ensuring data consistency in serializable execution plans::ACID properties are not important for ensuring data consistency in serializable execution plans {F}
:: Serializable execution plans prevent conflicts between concurrent operations on the same variables::Serializable execution plans prevent conflicts between concurrent operations on the same variables {T}
::Concurrency Control in Serializable Execution Plans::Serializable execution plans do not prevent conflicts between concurrent operations on the same variables {F}
::Operations in an equivalent execution plan are fixed and do not change depending on the context::Operations in an equivalent execution plan are fixed and do not change depending on the context {F}
::Operations in an equivalent execution plan are not fixed and change depending on the context::Operations in an equivalent execution plan are not fixed and change depending on the context {T}
::Equivalent execution plans allow variability in the order of operations to achieve the same final result::Equivalent execution plans allow variability in the order of operations to achieve the same final result {T}
::Equivalent Execution Plans::Equivalent execution plans allow variability in the order of operations to achieve the same final result {F}
::There are 3 techniques for implementing joins::There are 3 techniques for implementing joins {T}
::Scanning is a technique for implementing joins::Scanning is a technique for implementing joins {T}
::Nested Loops Join Method::Simple nested loops refer to scanning all tuples from the inner relation for each tuple from the outer relation {T}
::Implementing joins through hashing is not a common method::Implementing joins through hashing is not a common method {F}
::Merge join uses sorting of relations to optimize the join::Merge join uses sorting of relations to optimize the join {T}
::The outer relation is usually larger than the inner relation::The outer relation is usually larger than the inner relation {F}
::If there isn't enough memory, more than one block for the outer relation (R) can be used::If there isn't enough memory, more than one block for the outer relation (R) can be used {T}
::Further optimization may involve using a hash table for the outer relation (R)::Further optimization may involve using a hash table for the outer relation (R) {T}
::The outer relation (R) is scanned multiple times for each matching group in the inner relation (S)::The outer relation (R) is scanned multiple times for each matching group in the inner relation (S) {F}
::Sorting outer (R) and inner (S) relations on the join column groups tuples that match in that column::Sorting outer (R) and inner (S) relations on the join column groups tuples that match in that column {T}
::Indexing is a technique for implementing joins::Indexing is a technique for implementing joins {T}
::Partitioning is a technique for implementing joins::Partitioning is a technique for implementing joins {T}
::Indexing is not a technique for implementing joins::Indexing is not a technique for implementing joins {F
::Partitioning is not a technique for implementing joins::Partitioning is not a technique for implementing joins {F}
::The outer relation is usually equal to the inner relation::The outer relation is usually equal to the inner relation {T}
::Implementing joins through hashing is a common method::Implementing joins through hashing is a common method {T}
::If there isn't enough memory, the process can continue by using more blocks for the outer relation (R)::If there isn't enough memory, the process can continue by using more blocks for the outer relation (R) {T}
::SORT MERGE JOIN has cost (asymptotic): O(M log M) + O(N log N) + O(M+N)::SORT MERGE JOIN has cost (asymptotic): O(M log M) + O(N log N) + O(M+N) {T}
::SORT MERGE JOIN can be optimized::SORT MERGE JOIN can be optimized {T}
::After optimization, the cost for SORT MERGE JOIN is 3(M+N)::After optimization, the cost for SORT MERGE JOIN is 3(M+N) {T}
::SORT MERGE JOIN cannot be optimized::SORT MERGE JOIN cannot be optimized {F}
::After optimization, the cost for SORT MERGE JOIN is (M+N)::After optimization, the cost for SORT MERGE JOIN is (M+N) {F}
::In practice, the costs for sort-merge join, as well as for external sorting, are linear::In practice, the costs for sort-merge join, as well as for external sorting, are linear {T}
::In practice, the costs for sort-merge join, as well as for external sorting, are logarithmic::In practice, the costs for sort-merge join, as well as for external sorting, are logarithmic {F}
::SORT MERGE JOIN results in a new table::SORT MERGE JOIN results in a new table {T}
::SORT MERGE JOIN results in a new database::SORT MERGE JOIN results in a new database {F}
::SORT MERGE JOIN does not have a result::SORT MERGE JOIN does not have a result {F}
::SORT MERGE JOIN does the same thing as hash tables::SORT MERGE JOIN does the same thing as hash tables {F}
::SORT MERGE JOIN is not a method for implementing joins::SORT MERGE JOIN is not a method for implementing joins {F}
::Scanning the outer and inner relations defines the join process::Scanning the outer and inner relations defines the join process {T}
::Does the creation of new users need to be audited?::Does the creation of new users need to be audited? {T}
::Rights granting and data manipulation should not be audited::Rights granting and data manipulation should not be audited {F}
::Schema changes must not be audited::Schema changes must not be audited {F}
::In multilevel databases, users with security levels S and TS can see tuples of class S and C::In multilevel databases, users with security levels S and TS can see tuples of class S and C {T}
::In multilevel databases, users with security level C can see tuples of class S::In multilevel databases, users with security level C can see tuples of class S {F}
::In multilevel databases, users with security level U can see tuples of class U::In multilevel databases, users with security level U can see tuples of class U {T}
::In multilevel databases, users with security levels S and TS can only see tuples of class S::In multilevel databases, users with security levels S and TS can only see tuples of class S {F}
::The security of multilevel databases can be increased through poly instantiation::The security of multilevel databases can be increased through poly instantiation {T}
::The security of multilevel databases cannot be increased through poly instantiation::The security of multilevel databases cannot be increased through poly instantiation {F}
::When using poly instantiation, an ID can appear multiple times with different security evaluations::When using poly instantiation, an ID can appear multiple times with different security evaluations {T}
::When using poly instantiation, an ID cannot appear multiple times with different security evaluations::When using poly instantiation, an ID cannot appear multiple times with different security evaluations {F}
::If a user has multiple roles, then that user has the union of all rights granted by those roles::If a user has multiple roles, then that user has the union of all rights granted by those roles {T}
::If a user has multiple roles, then that user has the intersection of all rights granted by those roles::If a user has multiple roles, then that user has the intersection of all rights granted by those roles {F}
::If a user has multiple roles, then that user has the intersection of all rights granted by those roles::Role based security models ease rights granting when people change, for example in a company {T}
::Role based security models prevent rights granting when people change, for example in a company::Role based security models prevent rights granting when people change, for example in a company {F}
::Is auditing an important security measure when monitoring access and changes?::Is auditing an important security measure when monitoring access and changes? {T}
::Is auditing an unnecessary security measure when monitoring access and changes?::Is auditing an unnecessary security measure when monitoring access and changes? {F}
::Statistic information refers to aggregate values::Statistic information refers to aggregate values {T}
::Statistic Database Query Restriction::When using statistic databases, no statistic query shall be allowed if less than n tuples are present in the result {T}
::Security of Statistic Database Queries::The following restriction does not provide enough security when dealing with statistic databases: "No statistic query shall be allowed if less than n tuples are present in the result" {F}
::A distributed database stores data in a single location::A distributed database stores data in a single location {F}
::In a centralized database system, all data is stored in one place::In a centralized database system, all data is stored in one place {T}
::Cohesiveness of Distributed Databases::A distributed database operates as a single cohesive system despite being spread across multiple locations {T}
::A centralized database system has a simpler infrastructure than a distributed database system::A centralized database system has a simpler infrastructure than a distributed database system {T}
::In a centralized database system, there's a single point of management for all data::In a centralized database system, there's a single point of management for all data {T}
::In a distributed database system, transactions must adhere to ACID properties::In a distributed database system, transactions must adhere to ACID properties {T}
::Redundancy and Availability in Distributed Databases::Distributed databases can offer higher availability compared to centralized databases due to redundancy {T}
::A distributed database can consist of multiple types of DBMS operating across different nodes::A distributed database can consist of multiple types of DBMS operating across different nodes {T}
::Data Independence in Distributed Databases::In a distributed database, data independence means users do not need to know the exact location of the data {F}
::Ease of Maintenance in Centralized Databases::Centralized databases are typically easier to maintain and troubleshoot compared to distributed databases {T}
::Distributed database systems require additional communication costs for coordination between nodes::Distributed database systems require additional communication costs for coordination between nodes {T}
::Centralized database systems are more scalable than distributed database systems::Centralized database systems are more scalable than distributed database systems {F}
::In distributed database systems, parallel request processing is possible::In distributed database systems, parallel request processing is possible {T}
::Distributed concurrency control ensures global serializability in a distributed database::Distributed concurrency control ensures global serializability in a distributed database {T}
::Communication failure between nodes can lead to network partitioning in distributed databases::Communication failure between nodes can lead to network partitioning in distributed databases {T}
::Client-Server Architecture::A client-server architecture is not considered a distributed database system because data is processed across multiple servers {F}
::Fragmentation in distributed databases can be horizontal or vertical::Fragmentation in distributed databases can be horizontal or vertical {T}
::Fragmentation Types::Horizontal fragmentation splits data based on tuple sets, whereas vertical fragmentation splits data based on attributes {T}
::Replication in distributed databases can improve query processing speed::Replication in distributed databases can improve query processing speed {T}
::Committing Transaction in Synchronous Replication::Synchronous replication requires all copies of modified data to be updated before committing a transaction {T}
::Asynchronous replication can result in data inconsistencies between nodes::Asynchronous replication can result in data inconsistencies between nodes {T}
::Voting Procedure in Synchronous Replication::A voting procedure in synchronous replication ensures that a majority of copies are written before an update is committed {T}
::ROWA (Read-Any Write-All) is a common approach to asynchronous replication::ROWA (Read-Any Write-All) is a common approach to asynchronous replication {F}
::Propagation of Changes in Asynchronous Replication::Changes in asynchronous replication are typically propagated after the modifying transaction commits {F}
::A primary-site replication system allows multiple copies of a relation to be modified directly::A primary-site replication system allows multiple copies of a relation to be modified directly {F}
::Peer-to-peer replication involves multiple master copies of a relation::Peer-to-peer replication involves multiple master copies of a relation {T}
::Asynchronous replication in distributed databases allows for delayed consistency::Asynchronous replication in distributed databases allows for delayed consistency {T}
::Distributed data warehousing typically involves asynchronous replication::Distributed data warehousing typically involves asynchronous replication {T}
::Distributed database systems can use middleware to coordinate queries and transactions::Distributed database systems can use middleware to coordinate queries and transactions {T}
::Global Catalog in Distributed Databases::The global catalog in a distributed database contains metadata like the global conceptual schema and fragmentation schema {T}
::In a distributed database, if a node fails, it can affect the atomicity of transactions::In a distributed database, if a node fails, it can affect the atomicity of transactions {T}
::Communication Overhead in Synchronous Replication::Synchronous replication generally involves more communication overhead compared to asynchronous replication {T}
::Primary-Site Replication::Primary-site replication defines exactly one primary copy of a relation, with others being secondary copies {T}
::In distributed database systems, communication costs are typically lower than in centralized systems::In distributed database systems, communication costs are typically lower than in centralized systems {F}
::Fragmentation is used in distributed databases to enhance performance and data organization::Fragmentation is used in distributed databases to enhance performance and data organization {T}
::Geographical Latency in Centralized Systems::In a centralized database system, geographical limitations might cause higher latency for users far from the central server {T}
::Expense of Synchronous Replication::Synchronous replication in distributed databases tends to be more expensive due to required commit protocols {T}
::Performance Bottlenecks of Centralized Catalog::Centralized catalog in distributed databases can create potential performance bottlenecks due to centralized storage {T}
::Architectures in Distributed Databases::Distributed databases can implement different architectures, including client-server, collaborative server, and middleware systems {T}
::A heterogeneous distributed database system has the same type of DBMS running on each node::A heterogeneous distributed database system has the same type of DBMS running on each node {F}
::Replication in distributed databases increases data availability and reliability::Replication in distributed databases increases data availability and reliability {T}
::Horizontal fragmentation divides a relation into disjoint tuple sets using a qualification condition::Horizontal fragmentation divides a relation into disjoint tuple sets using a qualification condition {T}
::Synchronous replication ensures all copies are updated before committing a transaction::Synchronous replication ensures all copies are updated before committing a transaction {T}
::Role of Middleware in Distributed Databases::The middleware system in a distributed database coordinates queries and transactions between multiple DBMS {T}
::In asynchronous replication, it's possible for different copies to become inconsistent over time::In asynchronous replication, it's possible for different copies to become inconsistent over time {T}
::Horizontal fragmentation splits data based on attributes with similar access patterns::Horizontal fragmentation splits data based on attributes with similar access patterns {F}
::Collaborative Server Architecture in Distributed Databases::The collaborative server architecture in distributed databases allows a query to span multiple compute nodes {T}
::Redundancy-free allocation in a distributed database assigns each fragment to exactly one station::Redundancy-free allocation in a distributed database assigns each fragment to exactly one station {T}
::Replicated Catalog Architecture in Distributed Databases::The replicated catalog architecture in distributed databases involves storing a complete copy of the global catalog on each node {T}
::In a partitioned catalog, the global catalog is divided among all nodes, providing node autonomy::In a partitioned catalog, the global catalog is divided among all nodes, providing node autonomy {T}
::In distributed databases, applying asynchronous replication changes is done on secondary nodes::In distributed databases, applying asynchronous replication changes is done on secondary nodes {T}
::Inferred horizontal fragmentation requires a compound operation with a different relation::Inferred horizontal fragmentation requires a compound operation with a different relation {T}
::The site catalog describes all objects (fragments, replicas) on a node in a distributed database::The site catalog describes all objects (fragments, replicas) on a node in a distributed database {T}
::Log-based Capture in Asynchronous Replication::In the log-based capture method for asynchronous replication, the system-specific logs are used to generate a table of changed data {T}
::Efficiency of Log-based Capture in Asynchronous Replication::Log-based capture is generally considered less efficient than procedural capture for asynchronous replication {F}
::Procedural Capture Method in Asynchronous Replication::The procedural capture method for asynchronous replication often uses triggers to generate a snapshot of the primary copy {T}
::Architecture of Data Warehousing::Data warehousing involves a centralized architecture for distributed database systems {F}
::Apply Process in Asynchronous Replication::When implementing asynchronous replication, the apply process on the secondary node periodically applies changes from the primary copy {T}
::Snapshot replication is a common method used for asynchronous replication in commercial products::Snapshot replication is a common method used for asynchronous replication in commercial products {T}
::A replicated distributed database can have different copies of data on different nodes::A replicated distributed database can have different copies of data on different nodes {T}
::Efficiency of Log-based Capture::Log-based capture tends to be more efficient than procedural capture because it minimizes delay in propagating changes {T}
::Network Partitioning in Distributed Databases::Network partitioning in distributed databases can lead to splitting operational computers into disjoint partitions {T}
::ROWA Approach in Synchronous Replication::The ROWA approach for synchronous replication requires all replicas to be changed synchronously before a transaction completes {T}
::In a distributed database, distributed concurrency control ensures global serializability::In a distributed database, distributed concurrency control ensures global serializability {T}
::Vertical Fragmentation::Vertical fragmentation combines attributes with the same access patterns into the same fragment {T}
::Resilience to Node Failure::Distributed database systems are typically more resilient to node failure compared to centralized systems {T}
::Horizontal fragmentation is useful for disjointing tuple sets based on a qualification condition::Horizontal fragmentation is useful for disjointing tuple sets based on a qualification condition {T}
::Vertical fragmentation involves breaking a relation into subsets of attributes::Vertical fragmentation involves breaking a relation into subsets of attributes {T}
::The replicated catalog architecture has advantages in terms of read access efficiency::The replicated catalog architecture has advantages in terms of read access efficiency {T}
::Network Communication Errors::Network communication in distributed database systems can be prone to errors like message loss and corruption {T}
::The asynchronous replication method is often used in commercial replication servers::The asynchronous replication method is often used in commercial replication servers {T}
::Distributed commit protocols in distributed databases help ensure transaction consistency::Distributed commit protocols in distributed databases help ensure transaction consistency {T}
::Centralized Catalog::The centralized catalog architecture in distributed databases creates a single point of failure {T}
::Global Catalog::A global catalog in a distributed database contains metadata about the global conceptual schema {T}
::Site Catalog::A site catalog in a distributed database controls replicas of the relations created on a specific node {T}
::Partitioned Catalog::In a partitioned catalog architecture, the global catalog is stored across multiple nodes in a distributed database {T}
::Peer-to-Peer Replication::Peer-to-peer replication allows multiple nodes to act as master copies {T}
::Synchronous Replication Voting::In synchronous replication, the voting procedure requires writing to a majority of copies for updates to commit {T}
::ROWA Approach::Read-any Write-all (ROWA) is a common approach to synchronous replication in distributed databases {T}
::Distributed Request Processing::Distributed database systems support distributed request processing, allowing for more flexibility in executing queries {T}
::The precedence graph is using a directed graph::The precedence graph is using a directed graph {T}
::The precedence graph is using an undirected graph::The precedence graph is using an undirected graph {F}
::Each node of the precedence graph represents the execution order::Each node of the precedence graph represents the execution order {F}
::Each node of the precedence graph represents a transaction::Each node of the precedence graph represents a transaction {T}
::Each edge of the precedence graph represents the execution order::Each edge of the precedence graph represents the execution order {T}
::Each edge of the precedence graph represents a transaction::Each edge of the precedence graph represents a transaction {F}
::Sequential Execution::A directed edge from node A to node B indicates that statement A precedes statement B in execution order {T}
::Directed Edge::A directed edge from node A to node B indicates that statement A executes before statement B {F}
::Undirected Edge::An undirected edge from node A to node B does not indicate the execution order between statements A and B {F}
::Edge Direction::The direction of an edge from node A to node B does not determine the execution order of statements A and B {F}
::Repeatable Read Modification::Repeatable Read isolation level allows other transactions to modify rows selected by the current transaction before it completes {F}
::Read Committed Data Visibility::Read Committed isolation level guarantees that a transaction will always see the most recent committed data {T}
::Serializable Transaction Execution::Serializable isolation level ensures that transactions are executed in a manner equivalent to some serial order {T}
::Repeatable Read Row Consistency::Repeatable Read isolation level guarantees that if a row is read twice within the same transaction, the result will be different each time {F}
::Phantom reads are allowed in Repeatable Read isolation level::Phantom reads are allowed in Repeatable Read isolation level {T}
::Serializable Isolation Contention::Serializable isolation level may lead to increased contention and potential deadlock situations due to strict locking mechanisms {T}
::Serializable Data Consistency::Serializable isolation level offers the lowest level of data consistency compared to other isolation levels {F}
::Repeatable Read Data Consistency::Repeatable Read isolation level is less strict than Read Committed isolation level in terms of data consistency {F}
::Serializable Performance Overhead::Performance overhead is typically lower in Serializable isolation level compared to Repeatable Read isolation level {F}
::Serializable Examples::Examples of Serializable isolation level include scenarios where funds are double-spent due to concurrent transactions in a banking system {T}