当前位置:网站首页>[exercise 6] [Database Principle]
[exercise 6] [Database Principle]
2022-07-03 12:46:00 【Laughing cold faced ghost】
List of articles
One 、 Single topic selection
1. View mechanism improves the efficiency of database system ().
A) integrity
B) Security
C) Uniformity
D) concurrency control
answer :B
2. The prevention object of integrity control is ().
A) Illegal users
B) Non semantic data
C) Illegal operation
D) Incorrect data structure
answer :B
3. The main objects of security control are ().
A) Legal users
B) Non semantic data
C) Illegal operation
D) Incorrect data
answer :C
4. When a transaction is executed , Should abide by “ Don't do either , Or do it all ” Principles , This is a matter of ().
A) Atomicity
B) Uniformity
C) Isolation,
D) persistence
answer :A
5. The statement to realize transaction rollback is ().
A)GRANT
B)COMMIT
C)ROLLBACK
D)REVOKE
answer :C
6. The role of backup copy is ().
A) Security
B) Integrity control
C) concurrency control
D) Database recovery
answer :D
7. The commonly used technology to solve the problem of data inconsistency caused by concurrency control is ().
A) The blockade
B) Access control
C) recovery
D) negotiation
answer :A
8. Such as business T For data objects R Realization X The blockade , be T Yes R().
A) Can only read but not write
B) Can only write, can't read
C) It's both readable and writable
D) Can't read or write
answer :C
9. In database technology ,“ Dirty data ” Refer to ().
A) Data not backed back
B) Uncommitted data
C) Fallback data
D) Data not submitted and subsequently withdrawn
answer :D
10.“ journal ” Files are used to save ().
A) The process of running the program
B) Data manipulation
C) Program execution result
D) Update the database
answer :D
12. In the transaction dependency graph , If the dependencies of two transactions form a loop , Then it will ().
A) There is a live lock phenomenon
B) Deadlock occurs
C) Transaction executed successfully
D) Transaction execution failed
answer :B
14. Consistency of transactions means ().
A) All operations included in the transaction are either done , Either not
B) Once the transaction is committed , Changes to the database are permanent
C) The operations and data used within a transaction are isolated from other concurrent transactions
D) The transaction must be to change the database from one consistency state to another
answer :D
15. Protect the database , Prevent data leakage caused by unauthorized or illegal use 、 Change destroys . This refers to the of data ().
A) Security
B) integrity
C) concurrency control
D) recovery
answer :A
16.SQL Use () Statement grants system permission or object permission to the user .
A)SELECT
B)CREATE
C)GRANT
D)REVOKE
right key :C
17. In the following description of views , What's not right is ().
A) Views are out of mode
B) Using views can speed up the execution of query statements
C) Views are virtual tables
D) Using views can speed up the writing of query statements
right key :B
Two 、 Completion
1.DBMS The security protection function of the database is through ____ control 、____ control 、____ Control and ____ Realized in four aspects .
answer : Security 、 integrity 、 concurrency 、 Data recovery
2. Two important indicators to measure the authorization mechanism are ____ and ____.
answer : Data objects 、 Operation type
3. It is a working unit executed in the database system , It is a user-defined sequence of operations . It has ____、____、____ and ____ Four characteristics .
answer : Business 、 Atomicity 、 Uniformity 、 Isolation, 、 persistence
4. The database inconsistencies caused by concurrent operations mainly include ____、____ and ____ Three .
answer : Lost update 、 Read dirty data 、 It can't be read repeatedly
5. The main methods to realize concurrency control are ____ technology , The basic types of blockade are ____ and ____ Two kinds of .
answer : The blockade 、 Exclusive lock 、 Shared lock
6. During the operation of the database ____ fault 、____ Faults and ____ Fault category III .
answer : Business 、 System 、 medium
7. Rules and defaults are used to help users realize data ____.
answer : integrity
8. according to SQL Server Safety requirements for , When a user wants to access SQL Server Database in , Must be in SQL Server To create a ____ and ____.
answer : Login account 、 The user account
9. Record the storage location according to the index , The index can be divided into ____ Index and ____ Indexes .
answer : Gather 、 Non aggregation
10. Views are virtual tables , Its data is not stored , Only store it in the database ____.
answer : Definition
边栏推荐
- Wechat applet pages always report errors when sending values to the background. It turned out to be this pit!
- Detailed explanation of the most complete constraintlayout in history
- 剑指Offer07. 重建二叉树
- Eureka自我保护
- [ManageEngine] the role of IP address scanning
- 最新版抽奖盲盒运营版
- Kotlin notes - popular knowledge points asterisk (*)
- 阿里 & 蚂蚁自研 IDE
- JVM memory model
- Kubectl_ Command experience set
猜你喜欢
Sword finger offer07 Rebuild binary tree
记录自己vulnhub闯关记录
阿里 & 蚂蚁自研 IDE
The latest version of lottery blind box operation version
Low code platform international multilingual (I18N) technical solution
What is more elegant for flutter to log out and confirm again?
剑指Offer07. 重建二叉树
Sword finger offer03 Repeated numbers in the array [simple]
Sword finger offer09 Implementing queues with two stacks
社交社区论坛APP超高颜值UI界面
随机推荐
Swift Error Handling
双链笔记·思源笔记综合评测:优点、缺点、评价
alright alright alright
【ManageEngine】IP地址扫描的作用
Everything comes to him who waits
Computer version wechat applet full screen display method, mobile phone horizontal screen method.
flinksql是可以直接客户端建表读mysql或是kafka数据,但是怎么让它自动流转计算起来呢?
context. Getexternalfilesdir() is compared with the returned path
studio All flavors must now belong to a named flavor dimension. Learn more
Xctf mobile--app3 problem solving
ORM use of node -serialize
Cloud Computing future - native Cloud
Kubectl_ Command experience set
Solve the problem of VI opening files with ^m at the end
[ManageEngine] the role of IP address scanning
Public and private account sending prompt information (user microservice -- message microservice)
02_ Lock the code, and don't let the "lock" become a worry
Record your vulnhub breakthrough record
Using swift language features, write a pseudo-random number generator casually
Kotlin notes - popular knowledge points asterisk (*)