2016 first half database systems engineering teacher morning test (52-75)

Source: Internet
Author: User

"Five years college entrance examination three years of simulation" equivalent to the entrance examination "Martial arts Cheats" in the "Nine Yin Canon." A large amount of the question bank, the real problem of detailed analysis, the teachers and students sought after. Can be seen, the real problem is to deal with the examination of good information, the following Greek soft Test college for you to organize the first half of 2016 years of database Systems Engineering Test real problem of the morning, help you cultivate a "stunt" For the next year 's Database Systems Engineering Exam .


2016 first half database Systems Engineering exam morning test (52-75)

The system runs multiple transactions at the same time, and if one of the transactions is forcibly exited by the system because of its own failure, the other transaction is still functioning normally, and the fault is called (). When this failure occurs, it causes inconsistencies in the database, and the solution is ().

(A). Transaction failure

B System failure

C Media failure

D Program Bug

(+) A. The transaction is rolled back by the user

B The transaction is compensated by the program

C. Rollback of the transaction by the DBMS

D The transaction is rolled back by the DBA

Concurrent scheduling, assuming that the initial value of the transaction T1, T2 pre-execution data item x.y is x=100,y=200. When the schedule execution is complete, the value of x.y is (); Such inconsistency is called ().

650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-15/ E5f8dd4e-c322-4f92-92fe-4d99d6b37868.png "alt=" on Database 6.png "/>

(a.x=70,y=300)

b.x=70,y=330

c.x=70,y=270

d.x=70,y=230

(A). Missing modifications

B Read dirty data

C Non-REPEATABLE READ

D Destruction of transactional atomicity

In the running system, because of the failure of the server reboot, the transaction is interrupted, the transaction is destroyed the Atomicity, the method of recovery is to take advantage of the log () operation, and the committed transaction has not been written to disk in the event of a failure, the transaction is destroyed (), the method of recovery is to use the log for redo operation.

(A.undo)

B.redo

C.codunit

D.rollback

(A). Atomic Nature

B Consistency

C Isolation of

D Durability

During the development of database application system, it is often used () to update the database, which is written in the way of the transaction program.

(+) A. View

B Index

C Stored Procedures

D Trigger

The following is a description of the extended e-r diagram design, which is correct ().

() A. A contact can be considered an entity, which is associated with another entity, called an aggregation

B The property of a contact can be an identifier property of its associated entity

C Properties can be associated with other entities

D The linkage between three entities is equivalent to 22 of the three entities

Database refactoring refers to the decomposition of a table in a database for performance reasons, and the creation of a () with the same name as the original table to ensure that the application that queries the table does not change, by modifying the () update of the original table to ensure that the update call to the database is not changed by the external program.

(A). View

B. Index

C. Stored Procedures

D. Triggers

(A). View

B Index

C Stored Procedures

D Trigger

The global concept layer is the whole abstraction of the distributed database, including the characteristic and logical structure of all the data in the system, and the () mode is not included in the three pattern description information which is included in the distribution transparency feature.

(+) A. Global Concepts

B Sharding

C Distribution

D Access

In the following NoSQL databases, () is a high-performance distributed memory object cache database, which can improve the speed and scalability of dynamic Web applications by caching database query results and reducing database access times.

(A.MONGODB).

B.memcached

C.neo4j

D.hbase

The typical application of clustering does not include (), () is a typical clustering algorithm.

A. In business applications, help market analysts find different customer groups

B Categorize documents on the Web

C. Analyzing Web log data and discovering the same user access patterns

D. Diagnosis of new patients based on previous patient characteristics

(+) A decision tree

B.apriori

C K-means

D Svm

By default, the FTP server's control port is (), and the port when uploading the file is ().

(A). Ports greater than 1024

B 20

C 80

D 2 1

(+) A. Ports greater than 1 024

B 20

C 80

D 21st

Use the ping command to perform network detection, and in the case of a series of tests, the first thing to do is () in accordance with the from near principle.

(A). Ping Default Gateway

B.ping Local IP

c.ping127.0.0.1

D.ping Remote Host

The Inrernet protocol attribute parameter for a PC, as shown, is the IP address of the default gateway ().

650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-15/ 4cba9870-eff5-4c13-8402-fc7e4d180f72.png "alt=" on Database 7.png "/>

(a.8.8.8.8)

b.202117.115.3

c.192.168.2.254

d.202.117.11518

In one of the SNMP configurations, the ability to respond to Manager2 's getrequest request is ().

650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-15/ 3b2ce925-8ee0-45e0-8c94-ecfb653af3a5.png "alt=" on Database 8.png "/>

(A.AGENTL)

B.agent2

C.agent3

D.agent4

In the fields of physical security and information security,access control are the selective restriction of access to a PL Ace or other resource. The act of accessing may mean consuming,entering,or using. Permission to access a resource is called authorization (authorized).

An access control mechanism () between a user (or a process executing on behalf of a user) and system Resources,such as Applic ations,operating systems,firewalls;routers,files,and databases. The system must first authenticate (authentication) a user seeking access. Typically the authentication function determines whether the user is () to access the system at all.

Then the access control function determines if the specific requested access by this user is permitted. A Security Administrator maintains an authorization database which specifies what type of access to which resources are Allo Wed for the This user. The access control function consults this database to determine whether to () access. An auditing function monitors and keeps a record of the user accesses to system resources.

In Practice,a number of () cooperatively share the access control function. All Operating Systems has at least a rudimentary (basic). And in many cases a quite robust,access control component. Add-on security packages can add to the () access control capabilities of the OS. Particular applications.or Utilities,such as a database management system,also incorporate access control functions. External Devices,such as Firewalls,can also provide access control services.

(a.cooperates)

B.coordinates

C.connects

D.mediates

(a.denied)

b.permitted

c.prohibited

d.rejected

(A.open)

B.monitor

C.grant

D.seek

(a.components)

B.users

C.mechanisms

D.algorithms

(A.remote)

B.native

C.controlled

d.automated



2016 first half database systems engineering teacher morning test (52-75)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.