"Five years college entrance examination three years of simulation" equivalent to the entrance examination "Martial arts Cheats" in the "Nine Yin Canon." A large amount of the question bank, the real problem of detailed analysis, the teachers and students sought after. Can be seen, the real problem is to deal with the examination of good information, the following Greek soft Test college for you to organize the first half of 2016 years of database Systems Engineering Test real problem of the morning, help you cultivate a "stunt" For the next year 's Database Systems Engineering Exam .
2016 first half database Systems Engineering exam morning test (52-75)
The system runs multiple transactions at the same time, and if one of the transactions is forcibly exited by the system because of its own failure, the other transaction is still functioning normally, and the fault is called (). When this failure occurs, it causes inconsistencies in the database, and the solution is ().
(A). Transaction failure
B System failure
C Media failure
D Program Bug
(+) A. The transaction is rolled back by the user
B The transaction is compensated by the program
C. Rollback of the transaction by the DBMS
D The transaction is rolled back by the DBA
Concurrent scheduling, assuming that the initial value of the transaction T1, T2 pre-execution data item x.y is x=100,y=200. When the schedule execution is complete, the value of x.y is (); Such inconsistency is called ().
650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-15/ E5f8dd4e-c322-4f92-92fe-4d99d6b37868.png "alt=" on Database 6.png "/>
(a.x=70,y=300)
b.x=70,y=330
c.x=70,y=270
d.x=70,y=230
(A). Missing modifications
B Read dirty data
C Non-REPEATABLE READ
D Destruction of transactional atomicity
In the running system, because of the failure of the server reboot, the transaction is interrupted, the transaction is destroyed the Atomicity, the method of recovery is to take advantage of the log () operation, and the committed transaction has not been written to disk in the event of a failure, the transaction is destroyed (), the method of recovery is to use the log for redo operation.
(A.undo)
B.redo
C.codunit
D.rollback
(A). Atomic Nature
B Consistency
C Isolation of
D Durability
During the development of database application system, it is often used () to update the database, which is written in the way of the transaction program.
(+) A. View
B Index
C Stored Procedures
D Trigger
The following is a description of the extended e-r diagram design, which is correct ().
() A. A contact can be considered an entity, which is associated with another entity, called an aggregation
B The property of a contact can be an identifier property of its associated entity
C Properties can be associated with other entities
D The linkage between three entities is equivalent to 22 of the three entities
Database refactoring refers to the decomposition of a table in a database for performance reasons, and the creation of a () with the same name as the original table to ensure that the application that queries the table does not change, by modifying the () update of the original table to ensure that the update call to the database is not changed by the external program.
(A). View
B. Index
C. Stored Procedures
D. Triggers
(A). View
B Index
C Stored Procedures
D Trigger
The global concept layer is the whole abstraction of the distributed database, including the characteristic and logical structure of all the data in the system, and the () mode is not included in the three pattern description information which is included in the distribution transparency feature.
(+) A. Global Concepts
B Sharding
C Distribution
D Access
In the following NoSQL databases, () is a high-performance distributed memory object cache database, which can improve the speed and scalability of dynamic Web applications by caching database query results and reducing database access times.
(A.MONGODB).
B.memcached
C.neo4j
D.hbase
The typical application of clustering does not include (), () is a typical clustering algorithm.
A. In business applications, help market analysts find different customer groups
B Categorize documents on the Web
C. Analyzing Web log data and discovering the same user access patterns
D. Diagnosis of new patients based on previous patient characteristics
(+) A decision tree
B.apriori
C K-means
D Svm
By default, the FTP server's control port is (), and the port when uploading the file is ().
(A). Ports greater than 1024
B 20
C 80
D 2 1
(+) A. Ports greater than 1 024
B 20
C 80
D 21st
Use the ping command to perform network detection, and in the case of a series of tests, the first thing to do is () in accordance with the from near principle.
(A). Ping Default Gateway
B.ping Local IP
c.ping127.0.0.1
D.ping Remote Host
The Inrernet protocol attribute parameter for a PC, as shown, is the IP address of the default gateway ().
650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-15/ 4cba9870-eff5-4c13-8402-fc7e4d180f72.png "alt=" on Database 7.png "/>
(a.8.8.8.8)
b.202117.115.3
c.192.168.2.254
d.202.117.11518
In one of the SNMP configurations, the ability to respond to Manager2 's getrequest request is ().
650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-15/ 3b2ce925-8ee0-45e0-8c94-ecfb653af3a5.png "alt=" on Database 8.png "/>
(A.AGENTL)
B.agent2
C.agent3
D.agent4
In the fields of physical security and information security,access control are the selective restriction of access to a PL Ace or other resource. The act of accessing may mean consuming,entering,or using. Permission to access a resource is called authorization (authorized).
An access control mechanism () between a user (or a process executing on behalf of a user) and system Resources,such as Applic ations,operating systems,firewalls;routers,files,and databases. The system must first authenticate (authentication) a user seeking access. Typically the authentication function determines whether the user is () to access the system at all.
Then the access control function determines if the specific requested access by this user is permitted. A Security Administrator maintains an authorization database which specifies what type of access to which resources are Allo Wed for the This user. The access control function consults this database to determine whether to () access. An auditing function monitors and keeps a record of the user accesses to system resources.
In Practice,a number of () cooperatively share the access control function. All Operating Systems has at least a rudimentary (basic). And in many cases a quite robust,access control component. Add-on security packages can add to the () access control capabilities of the OS. Particular applications.or Utilities,such as a database management system,also incorporate access control functions. External Devices,such as Firewalls,can also provide access control services.
(a.cooperates)
B.coordinates
C.connects
D.mediates
(a.denied)
b.permitted
c.prohibited
d.rejected
(A.open)
B.monitor
C.grant
D.seek
(a.components)
B.users
C.mechanisms
D.algorithms
(A.remote)
B.native
C.controlled
d.automated
2016 first half database systems engineering teacher morning test (52-75)