Q:
When transaction Ti requests a data item currently held by Tj
belongs to collection: DBMS -TRANSACTIONS MCQs
DBMS -TRANSACTIONS MCQs
- With regards to transaction processing, any DBMS should be capable of:
- What is ACID properties of Transactions
- Database locking concept is used to solve the problem of
- A lock that allows concurrent transactions to access different rows of the same table is known as a
- A transaction completes its execution is said to be
- A system is in a ______ state if there exists a set of transactions such that every transaction in the set is waiting for another transaction in the set
- The deadlock state can be changed back to stable state by using _____________ statement
- What are the ways of dealing with deadlock
- When transaction Ti requests a data item currently held by Tj
- When transaction Ti requests a data item currently held by Tj
- The deadlock in a set of transaction can be determined by
- A deadlock exists in the system if and only if the wait-for graph contains a ___________
- Selecting the victim to be rollbacked to the previous state is determined by the minimum cost. The factors determining cost of rollback is
- __________ rollback requires the system to maintain additional information about the state of all the running transactions
- Which of these is data type long literal
- Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read
- A transaction for which all committed changes are permanent is called
- In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed
- Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction
- A transaction may not always complete its execution successfully. Such a transaction is termed
- Transaction processing is associated with everything below except
- Transaction management ensures ____________ and __________ properties
- ____________ is an interface between low level database and application program
- Which of the following are functions of Database Manager
- Who detects the failure of the system and restore the database to consistent state
- A traditional data administrator performs which of the following roles
- Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally
- Which of the following is the preferred way to recover a database after a system failure
- Concurrency control is important for which of the following reasons
- A shared lock allows which of the following types of transactions to occur
- Locking may cause which of the following problems
- Performance analysis and tuning is which of the following
- Which of the following could cause data to be unavailable
- The transaction log includes which of the following
- Which of the following is part of an administrative policy to secure a database
- If both data and database administration exist in an organization, the database administrator is responsible for which of the following
- Which of the following is true concerning open-source DBMS
- A data warehouse administrator is concerned with which of the following
- Poor data administration can lead to which of the following
- Backward recovery is which of the following
- Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time
- In database management system, the executing process or executing program which considers the updating or reading of records stored in database is called
- The application of database management system in air flight seat booking in a way that one seat is accessed by only one clerk for customer reservation is classified as
- Collections of operations that form a single logical unit of work are called __________
- The “all-or-none” property is commonly referred to as _________
- Which of the following is a property of transactions
- Execution of translation in isolation preserves the _________ of a database
- Which of the following is not a property of a transaction
- Which of the following systems is responsible for ensuring durability
- Which of the following systems is responsible for ensuring isolation?
- State true or false: Information residing in the volatile storage does not usually survive system crashes
- A transaction that has not been completed successfully is called as _______
- Which of the following is not a transaction state
- The execution sequences in concurrency control are termed as ________
- The scheme that controls the interaction between executing transactions is called as _____
- I and J are _________ if they are operations by different transactions on the same data item, and at least one of them is a write operation
- lIf a schedule S can be transformed into a schedule S’ by a series of swaps of non-conflicting instructions, then S and S’ are
- A schedule is __________ if it is conflict equivalent to a serial schedule
- The set of ________ in a precedence graph consists of all the transactions participating in the schedule
- A ___________of the transactions can be obtained by finding a linear order consistent with the partial order of the precedence graph
- State true or false: If I = read(Q) and J = read(Q) then the order of I and J does not matter
- State true or false: If I = read(Q) and J = write(Q) then the order of I and J does not matter
- Which of the following is the most expensive method
- A transaction that performs only one operation is called as a _________
- The phenomenon in which one failure leads to a series of transaction rollbacks is called as ________
- State true or false: Every cascadeless schedule is also recoverable
- A ___________ is one where, for each pair of transactions Ti and Tj such that Tj reads a data item previously written by Ti , the commit operation of Ti appears before the commit operation of Tj
- State true or false: Transactions can only run serially
- Which of the following are the advantages of transaction concurrency
- The average time for a transaction to be completed after it has been submitted is called as __________
- If a schedule is equivalent to a serial schedule, it is called as a _________
- Which of the following is not a type of a schedule
- Which of the following is a transaction isolation level as specified by SQL standard
- State true or false: Serializable level may allow both serializable and non-serializable executions
- ________ allows only committed data to be read and further requires that no other transaction is allowed to update it between two reads of a data item by a transaction
- ________ allows only committed data to be read, but does not require repeatable reads
- ___________ allows uncommitted data to be read
- State true or false: All the isolation levels disallow dirty writes
- When is a timestamp allotted
- In ___________ isolation each transaction is given its own version of the database
- What is the disadvantage of locking
- Consider money is transferred from (1)account-A to account-B and (2) account-B to account-A. Which of the following form a transaction ?
- A transaction is delimited by statements (or function calls) of the form __________
- Identify the characteristics of transactions
- Which of the following has “all-or-none” property
- The database system must take special actions to ensure that transactions operate properly without interference from concurrently executing database statements. This property is referred to as
- The property of transaction that persists all the crashes is
- __________ states that only valid data will be written to the database
- The Oracle RDBMS uses the ____ statement to declare a new transaction start and its properties
- ____ means that the data used during the execution of a transaction cannot be used by a second transaction until the first one is completed
- In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction?
- Which character function can be used to return a specified portion of a character string
- Which of the following is TRUE for the System Variable $date$
- What are the different events in Triggers?
- The SQL statement SELECT SUBSTR(‘123456789’, INSTR(‘abcabcabc’,’b’), 4) FROM EMP; prints
- Which of the following SQL command can be used to modify existing data in a database table?
- When SQL statements are embedded inside 3GL, we call such a program as
- _______________ provides option for entering SQL queries as execution time, rather than at the development stage
- Each modification done in database transaction are first recorded into the
- _______ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed
- Which of the following is not a state in transaction
- _______________ joins are SQL server default
- The ________________ is essentially used to search for patterns in target string
- Which of the following is/are the Database server functions
- To delete a database ___________ command is used
- ____________ is a combination of two of more attributes used as a primary key
- Which of the following is not the function of client
- ____________ is a special type of stored procedure that is automatically invoked whenever the data in the table is modified
- ______________ requires that data should be made available to only authorized users
- Some of the utilities of DBMS are _____________
- ____________ allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement
- Which is essential a business problem not a data problem
- Which is primarily the result of a thorough understanding of information about an enterprise:
- McFadden has defined normalization in his which book___________
- The database design prevents some data from being represented due to _______
- How many types of insertion anomalies:
- Who developed the normalization process:
- E.F.Codd developed the normalization process in the which early:
- Which is the process of breaking a relation into multiple relations:
- Which formal method that locates and analyses relation schemas on the basis of their primary, candidate keys, and the FD’s that are present among the attributes of these schemas:
- Which is refers to a stalemate situation due to which no further progress is possible as computer await response of each other:
- Which is a duplicate copy of a file program that is stored on a different storage media than the original location:
- Which is duplication of computer operations and routine backups to combat any unforeseen problems:
- Optimization that is basically related to the rewriter module is termed as__________
- Optimization basically related to the Rewrite module is termed as_______
- Database security helps organizations to protect data from _____
- Copying files to secondary or specific devices is known as ______
- How many types of recovery control techniques:
- Which are types of recovery control techniques:
- Which server can joins the indexes when only multiple indexes combined can cover the query:
- In concurrency control policy the the lock is obtained on
- A concurrency-control policy such as this one leads to ______ performance, since it forces transactions to wait for preceding transactions to finish before they can start
- __________ are used to ensure that transactions access each data item in order of the transactions’ ____ if their accesses conflict
- EMPDET is an external table containing the columns EMPNO and ENAME. Which command would work in relation to the EMPDET table?
- In which scenario would you use the ROLLUP operator for expression or columns within a GROUP BY clause?
- Which statement is true regarding external tables
- A non-correlated subquery can be defined as ______
- Evaluate the following SQL statements in the given order
- What would be the outcome of the below query?
- Which of the following is not a property of transactions
- SNAPSHOT is used for (DBA)
- Isolation of the transactions is ensured by
- Constraint checking can be disabled in existing _______________ and _____________ constraints so that any data you modify or add to the table is not checked against the constraint
(c).Wound-wait
need an explanation for this answer? contact us directly to get an explanation for this answer