当前位置:网站首页>[exercise 6] [Database Principle]
[exercise 6] [Database Principle]
2022-07-03 12:46:00 【Laughing cold faced ghost】
List of articles
One 、 Single topic selection
1. View mechanism improves the efficiency of database system ().
A) integrity
B) Security
C) Uniformity
D) concurrency control
answer :B
2. The prevention object of integrity control is ().
A) Illegal users
B) Non semantic data
C) Illegal operation
D) Incorrect data structure
answer :B
3. The main objects of security control are ().
A) Legal users
B) Non semantic data
C) Illegal operation
D) Incorrect data
answer :C
4. When a transaction is executed , Should abide by “ Don't do either , Or do it all ” Principles , This is a matter of ().
A) Atomicity
B) Uniformity
C) Isolation,
D) persistence
answer :A
5. The statement to realize transaction rollback is ().
A)GRANT
B)COMMIT
C)ROLLBACK
D)REVOKE
answer :C
6. The role of backup copy is ().
A) Security
B) Integrity control
C) concurrency control
D) Database recovery
answer :D
7. The commonly used technology to solve the problem of data inconsistency caused by concurrency control is ().
A) The blockade
B) Access control
C) recovery
D) negotiation
answer :A
8. Such as business T For data objects R Realization X The blockade , be T Yes R().
A) Can only read but not write
B) Can only write, can't read
C) It's both readable and writable
D) Can't read or write
answer :C
9. In database technology ,“ Dirty data ” Refer to ().
A) Data not backed back
B) Uncommitted data
C) Fallback data
D) Data not submitted and subsequently withdrawn
answer :D
10.“ journal ” Files are used to save ().
A) The process of running the program
B) Data manipulation
C) Program execution result
D) Update the database
answer :D
12. In the transaction dependency graph , If the dependencies of two transactions form a loop , Then it will ().
A) There is a live lock phenomenon
B) Deadlock occurs
C) Transaction executed successfully
D) Transaction execution failed
answer :B
14. Consistency of transactions means ().
A) All operations included in the transaction are either done , Either not
B) Once the transaction is committed , Changes to the database are permanent
C) The operations and data used within a transaction are isolated from other concurrent transactions
D) The transaction must be to change the database from one consistency state to another
answer :D
15. Protect the database , Prevent data leakage caused by unauthorized or illegal use 、 Change destroys . This refers to the of data ().
A) Security
B) integrity
C) concurrency control
D) recovery
answer :A
16.SQL Use () Statement grants system permission or object permission to the user .
A)SELECT
B)CREATE
C)GRANT
D)REVOKE
right key :C
17. In the following description of views , What's not right is ().
A) Views are out of mode
B) Using views can speed up the execution of query statements
C) Views are virtual tables
D) Using views can speed up the writing of query statements
right key :B
Two 、 Completion
1.DBMS The security protection function of the database is through ____ control 、____ control 、____ Control and ____ Realized in four aspects .
answer : Security 、 integrity 、 concurrency 、 Data recovery
2. Two important indicators to measure the authorization mechanism are ____ and ____.
answer : Data objects 、 Operation type
3. It is a working unit executed in the database system , It is a user-defined sequence of operations . It has ____、____、____ and ____ Four characteristics .
answer : Business 、 Atomicity 、 Uniformity 、 Isolation, 、 persistence
4. The database inconsistencies caused by concurrent operations mainly include ____、____ and ____ Three .
answer : Lost update 、 Read dirty data 、 It can't be read repeatedly
5. The main methods to realize concurrency control are ____ technology , The basic types of blockade are ____ and ____ Two kinds of .
answer : The blockade 、 Exclusive lock 、 Shared lock
6. During the operation of the database ____ fault 、____ Faults and ____ Fault category III .
answer : Business 、 System 、 medium
7. Rules and defaults are used to help users realize data ____.
answer : integrity
8. according to SQL Server Safety requirements for , When a user wants to access SQL Server Database in , Must be in SQL Server To create a ____ and ____.
answer : Login account 、 The user account
9. Record the storage location according to the index , The index can be divided into ____ Index and ____ Indexes .
answer : Gather 、 Non aggregation
10. Views are virtual tables , Its data is not stored , Only store it in the database ____.
answer : Definition
边栏推荐
- Eureka self protection
- ncnn神經網絡計算框架在香柳丁派OrangePi 3 LTS開發板中的使用介紹
- 剑指Offer10- I. 斐波那契数列
- Pytext training times error: typeerror:__ init__ () got an unexpected keyword argument 'serialized_ options'
- 【数据库原理复习题】
- Day 1 of kotlin learning: simple built-in types of kotlin
- 剑指Offer09. 用两个栈实现队列
- Xctf mobile--app2 problem solving
- Everything comes to him who waits
- Idea packages the web project into a war package and deploys it to the server to run
猜你喜欢
![[ArcGIS user defined script tool] vector file generates expanded rectangular face elements](/img/39/0b31290798077cb8c355fbd058e4d3.png)
[ArcGIS user defined script tool] vector file generates expanded rectangular face elements

2.8 overview of ViewModel knowledge

Day 1 of kotlin learning: simple built-in types of kotlin

基于同步坐标变换的谐波电流检测

Wechat applet pages always report errors when sending values to the background. It turned out to be this pit!

Attack and defense world mobile--ph0en1x-100

1-2 project technology selection and structure

Sword finger offer09 Implementing queues with two stacks

Cloud Computing future - native Cloud

【ManageEngine】IP地址扫描的作用
随机推荐
阿里 & 蚂蚁自研 IDE
剑指Offer06. 从尾到头打印链表
Record your vulnhub breakthrough record
启用MemCached的SASL认证
Project video based on Linu development
最新版盲盒商城thinkphp+uniapp
Adult adult adult
Solve the problem of VI opening files with ^m at the end
I'm too lazy to write more than one character
elastic_ L01_ summary
Attack and defense world mobile--ph0en1x-100
ORM use of node -serialize
Official website of Unicode query
Kung Fu pays off, and learning is done
JVM内存模型
Ten workplace rules
Xctf mobile--app1 problem solving
Using swift language features, write a pseudo-random number generator casually
Keep learning swift
Everything comes to him who waits