Database Reference
In-Depth Information
9.17 What is deadlock? How can it be avoided? How can it be resolved once it occurs?
9.18 Explain the difference between optimistic and pessimistic locking.
9.19 Explain the benefits of marking transaction boundaries, declaring lock characteristics,
and letting the DBMS place locks.
9.20 What is SQL Transaction Control Language (TCL)? Explain the use of the SQL BEGIN
TRANSACTION, COMMIT TRANSACTION, and ROLLBACK TRANSACTION state-
ments. Why does MySQL also use the SQL START TRANSACTION statement?
9.21 Explain the meaning of the expression ACID transaction .
9.22 Describe statement-level consistency.
9.23 Describe transaction-level consistency. What disadvantage can exist with it?
9.24 What is the purpose of transaction isolation levels?
9.25 Explain the read-uncommitted isolation level. Give an example of its use.
9.26 Explain the read-committed isolation level. Give an example of its use.
9.27 Explain the repeatable-read isolation level. Give an example of its use.
9.28 Explain the serializable isolation level. Give an example of its use.
9.29 Explain the term SQL cursor.
9.30 Explain why a transaction may have many cursors. Also, how is it possible that a trans-
action may have more than one cursor on a given table?
9.31 What is the advantage of using different types of cursors?
9.32 Explain forward-only cursors. Give an example of their use.
9.33 Explain static cursors. Give an example of their use.
9.34 Explain keyset cursors. Give an example of their use.
9.35 Explain dynamic cursors. Give an example of their use.
9.36 What happens if you do not declare the transaction isolation level and the cursor type
to the DBMS? Is this good or bad?
9.37 What is SQL Data Control Language (DCL)? Explain the necessity of defining process-
ing rights and responsibilities. How are such responsibilities enforced, and what is the
role of SQL DCL in enforcing them?
9.38 Explain the relationships among USER, ROLE, PERMISSION, and OBJECT for a generic
database security system.
9.39 Should the DBA assume a firewall when planning security?
9.40 What should be done with unused DBMS features and functions?
9.41 Explain how to protect the computer that runs the DBMS.
9.42 With regard to security, what actions should the DBA take on user accounts and
passwords?
9.43 List two elements of a database security plan.
9.44 Describe the advantages and disadvantages of DBMS-provided and application-
provided security.
9.45 What is an SQL injection attack, and how can it be prevented?
9.46 Explain how a database could be recovered via reprocessing. Why is this generally not
feasible?
9.47 Define rollback and rollforward.
Search WWH ::




Custom Search