Sample Test Questions Domain 8 Flashcards
___ is used when databases are clustered to provide high fault tolerance and performance
Online transaction processing (OLTP)
in database design, the ACID test stands for:
Atomicity, Consistency, Isolation, Durability
___ in database design refers to dividing transactions into units of work ensuring that all modifications take effect or none take effect
Atomicity
___ in database design means that a transaction must follow the integrity policy developed for that particular database and ensure all data is consistent in the different databases
Consistency
___ in database design means that transactions execute in isolation until completed, without interacting with other transactions. The results of the modification are not available until the transaction is completed
Isolation
___ in database design means that once the transaction is verified as accurate on all systems, it is committed, and the databases cannot be rolled back
Durability
In the ___ database model, records and fields are related in a logical tree structure. Parents can have one child, many children, or no children
hierarchical
In an ___ database, when an application queries for data, it receives both the data and the procedure
object-oriented
___ testing involves testing an individual component in a controlled environment to validate data structure, logic, and boundary conditions
Unit
___ development involves the use of independent and standardized modules
Component-based
The Java ___ converts the bytecode into machine-level code that the processor on the particular system can understand
Virtual Machine (JVM)
___ integrity guarantees that the tuples are uniquely identified by primary key values
Entity
The ___ is an XML-based protocol that was created to replace Remote Procedure Calls (RPCs) and allow applications running on different operating systems to exchange information over the Internet
Simple Object Access Protocol (SOAP)
HTTP was not designed to work with ___, but SOAP was designed to work with HTTP
Remote Procedure Calls (RPCs)
___ is the best first step for developers to take to identify the security controls that should be coded into a software project
Threat modeling