Q:
Which of the following is not a property of a transaction
belongs to collection: DBMS -TRANSACTIONS MCQs
DBMS -TRANSACTIONS MCQs
- With regards to transaction processing, any DBMS should be capable of:
- What is ACID properties of Transactions
- Database locking concept is used to solve the problem of
- A lock that allows concurrent transactions to access different rows of the same table is known as a
- A transaction completes its execution is said to be
- A system is in a ______ state if there exists a set of transactions such that every transaction in the set is waiting for another transaction in the set
- The deadlock state can be changed back to stable state by using _____________ statement
- What are the ways of dealing with deadlock
- When transaction Ti requests a data item currently held by Tj
- When transaction Ti requests a data item currently held by Tj
- The deadlock in a set of transaction can be determined by
- A deadlock exists in the system if and only if the wait-for graph contains a ___________
- Selecting the victim to be rollbacked to the previous state is determined by the minimum cost. The factors determining cost of rollback is
- __________ rollback requires the system to maintain additional information about the state of all the running transactions
- Which of these is data type long literal
- Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read
- A transaction for which all committed changes are permanent is called
- In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed
- Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction
- A transaction may not always complete its execution successfully. Such a transaction is termed
- Transaction processing is associated with everything below except
- Transaction management ensures ____________ and __________ properties
- ____________ is an interface between low level database and application program
- Which of the following are functions of Database Manager
- Who detects the failure of the system and restore the database to consistent state
- A traditional data administrator performs which of the following roles
- Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally
- Which of the following is the preferred way to recover a database after a system failure
- Concurrency control is important for which of the following reasons
- A shared lock allows which of the following types of transactions to occur
- Locking may cause which of the following problems
- Performance analysis and tuning is which of the following
- Which of the following could cause data to be unavailable
- The transaction log includes which of the following
- Which of the following is part of an administrative policy to secure a database
- If both data and database administration exist in an organization, the database administrator is responsible for which of the following
- Which of the following is true concerning open-source DBMS
- A data warehouse administrator is concerned with which of the following
- Poor data administration can lead to which of the following
- Backward recovery is which of the following
- Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time
- In database management system, the executing process or executing program which considers the updating or reading of records stored in database is called
- The application of database management system in air flight seat booking in a way that one seat is accessed by only one clerk for customer reservation is classified as
- Collections of operations that form a single logical unit of work are called __________
- The “all-or-none” property is commonly referred to as _________
- Which of the following is a property of transactions
- Execution of translation in isolation preserves the _________ of a database
- Which of the following is not a property of a transaction
- Which of the following systems is responsible for ensuring durability
- Which of the following systems is responsible for ensuring isolation?
- State true or false: Information residing in the volatile storage does not usually survive system crashes
- A transaction that has not been completed successfully is called as _______
- Which of the following is not a transaction state
- The execution sequences in concurrency control are termed as ________
- The scheme that controls the interaction between executing transactions is called as _____
- I and J are _________ if they are operations by different transactions on the same data item, and at least one of them is a write operation
- lIf a schedule S can be transformed into a schedule S’ by a series of swaps of non-conflicting instructions, then S and S’ are
- A schedule is __________ if it is conflict equivalent to a serial schedule
- The set of ________ in a precedence graph consists of all the transactions participating in the schedule
- A ___________of the transactions can be obtained by finding a linear order consistent with the partial order of the precedence graph
- State true or false: If I = read(Q) and J = read(Q) then the order of I and J does not matter
- State true or false: If I = read(Q) and J = write(Q) then the order of I and J does not matter
- Which of the following is the most expensive method
- A transaction that performs only one operation is called as a _________
- The phenomenon in which one failure leads to a series of transaction rollbacks is called as ________
- State true or false: Every cascadeless schedule is also recoverable
- A ___________ is one where, for each pair of transactions Ti and Tj such that Tj reads a data item previously written by Ti , the commit operation of Ti appears before the commit operation of Tj
- State true or false: Transactions can only run serially
- Which of the following are the advantages of transaction concurrency
- The average time for a transaction to be completed after it has been submitted is called as __________
- If a schedule is equivalent to a serial schedule, it is called as a _________
- Which of the following is not a type of a schedule
- Which of the following is a transaction isolation level as specified by SQL standard
- State true or false: Serializable level may allow both serializable and non-serializable executions
- ________ allows only committed data to be read and further requires that no other transaction is allowed to update it between two reads of a data item by a transaction
- ________ allows only committed data to be read, but does not require repeatable reads
- ___________ allows uncommitted data to be read
- State true or false: All the isolation levels disallow dirty writes
- When is a timestamp allotted
- In ___________ isolation each transaction is given its own version of the database
- What is the disadvantage of locking
- Consider money is transferred from (1)account-A to account-B and (2) account-B to account-A. Which of the following form a transaction ?
- A transaction is delimited by statements (or function calls) of the form __________
- Identify the characteristics of transactions
- Which of the following has “all-or-none” property
- The database system must take special actions to ensure that transactions operate properly without interference from concurrently executing database statements. This property is referred to as
- The property of transaction that persists all the crashes is
- __________ states that only valid data will be written to the database
- The Oracle RDBMS uses the ____ statement to declare a new transaction start and its properties
- ____ means that the data used during the execution of a transaction cannot be used by a second transaction until the first one is completed
- In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction?
- Which character function can be used to return a specified portion of a character string
- Which of the following is TRUE for the System Variable $date$
- What are the different events in Triggers?
- The SQL statement SELECT SUBSTR(‘123456789’, INSTR(‘abcabcabc’,’b’), 4) FROM EMP; prints
- Which of the following SQL command can be used to modify existing data in a database table?
- When SQL statements are embedded inside 3GL, we call such a program as
- _______________ provides option for entering SQL queries as execution time, rather than at the development stage
- Each modification done in database transaction are first recorded into the
- _______ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed
- Which of the following is not a state in transaction
- _______________ joins are SQL server default
- The ________________ is essentially used to search for patterns in target string
- Which of the following is/are the Database server functions
- To delete a database ___________ command is used
- ____________ is a combination of two of more attributes used as a primary key
- Which of the following is not the function of client
- ____________ is a special type of stored procedure that is automatically invoked whenever the data in the table is modified
- ______________ requires that data should be made available to only authorized users
- Some of the utilities of DBMS are _____________
- ____________ allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement
- Which is essential a business problem not a data problem
- Which is primarily the result of a thorough understanding of information about an enterprise:
- McFadden has defined normalization in his which book___________
- The database design prevents some data from being represented due to _______
- How many types of insertion anomalies:
- Who developed the normalization process:
- E.F.Codd developed the normalization process in the which early:
- Which is the process of breaking a relation into multiple relations:
- Which formal method that locates and analyses relation schemas on the basis of their primary, candidate keys, and the FD’s that are present among the attributes of these schemas:
- Which is refers to a stalemate situation due to which no further progress is possible as computer await response of each other:
- Which is a duplicate copy of a file program that is stored on a different storage media than the original location:
- Which is duplication of computer operations and routine backups to combat any unforeseen problems:
- Optimization that is basically related to the rewriter module is termed as__________
- Optimization basically related to the Rewrite module is termed as_______
- Database security helps organizations to protect data from _____
- Copying files to secondary or specific devices is known as ______
- How many types of recovery control techniques:
- Which are types of recovery control techniques:
- Which server can joins the indexes when only multiple indexes combined can cover the query:
- In concurrency control policy the the lock is obtained on
- A concurrency-control policy such as this one leads to ______ performance, since it forces transactions to wait for preceding transactions to finish before they can start
- __________ are used to ensure that transactions access each data item in order of the transactions’ ____ if their accesses conflict
- EMPDET is an external table containing the columns EMPNO and ENAME. Which command would work in relation to the EMPDET table?
- In which scenario would you use the ROLLUP operator for expression or columns within a GROUP BY clause?
- Which statement is true regarding external tables
- A non-correlated subquery can be defined as ______
- Evaluate the following SQL statements in the given order
- What would be the outcome of the below query?
- Which of the following is not a property of transactions
- SNAPSHOT is used for (DBA)
- Isolation of the transactions is ensured by
- Constraint checking can be disabled in existing _______________ and _____________ constraints so that any data you modify or add to the table is not checked against the constraint
(b).Simplicity
need an explanation for this answer? contact us directly to get an explanation for this answer