Database Reference
In-Depth Information
commit
concurrent update
database password
data dictionary
data independence
deadlock
deadly embrace
decrypting
encryption
forward recovery
growing phase
journal
journaling
locking
log
metadata
nonprocedural language
password
permission
privacy
procedural language
recovery
replica
replicate
rollback
save
shrinking phase
smart card
synchronization
timestamp
timestamping
transaction
two-phase locking
utility services
victim
workgroup
254
Review Questions
1. When users update and retrieve data, what tasks does a DBMS perform that are hidden from the users?
2. What is metadata? Which component of a DBMS maintains metadata?
3. How does a catalog differ from a data dictionary?
4. What is meant by concurrent update?
5. Describe a situation that could cause a lost update.
6. What is locking, and what does it accomplish?
7. What is a transaction?
8. Describe two-phase locking.
9. What is deadlock? How does it occur?
10. How do some DBMSs use timestamping to handle concurrent update?
11. What is recovery?
12. What is journaling? What two types of images does a DBMS output to its journal?
13. When does a DBA use forward recovery? What are the forward recovery steps?
14. When does a DBA use backward recovery? What does the DBMS do to perform backward recovery?
15. What is security?
16. What is encryption? How does encryption relate to security?
17. What is authentication? Describe three types of authentication.
18. What are authorization rules?
19. What are permissions? Explain the relationship between permissions and workgroups.
20. How do views relate to security?
21. What is privacy? How is privacy related to security?
22. What are integrity constraints? Describe four different ways to handle integrity constraints. Which approach is
the most desirable?
23. What is data independence?
Search WWH ::




Custom Search