0% found this document useful (0 votes)
135 views9 pages

Adbms Unit 3 MCQ

The document discusses various concepts related to database recovery schemes and transaction management. It covers topics like failure types, logging techniques, concurrency control using locks, and ARIES recovery algorithm components like analysis pass, redo pass and undo pass. Key aspects covered are write-ahead logging, deferred modification vs immediate modification techniques, transaction failures, system crashes, recovery phases involving redo and undo operations, and concurrency control using locks at different granularity levels.

Uploaded by

TAUSEEF KHAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
135 views9 pages

Adbms Unit 3 MCQ

The document discusses various concepts related to database recovery schemes and transaction management. It covers topics like failure types, logging techniques, concurrency control using locks, and ARIES recovery algorithm components like analysis pass, redo pass and undo pass. Key aspects covered are write-ahead logging, deferred modification vs immediate modification techniques, transaction failures, system crashes, recovery phases involving redo and undo operations, and concurrency control using locks at different granularity levels.

Uploaded by

TAUSEEF KHAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

1.

The recovery scheme must also provide


a) High availability
b) Low availability
c) High reliability
d) High durability

2. Which one of the following is a failure to a system


a) Boot crash
b) Read failure
c) Transaction failure
d) All of the mentioned

3. Which of the following belongs to transaction failure


a) Read error
b) Boot error
c) Logical error
d) All of the mentioned

4. The system has entered an undesirable state (for example, deadlock), as a result of
which a transaction cannot continue with its normal execution. This is
a) Read error
b) Boot error
c) Logical error
d) System error

5. The transaction can no longer continue with its normal execution because of some
internal condition, such as bad input, data not found, overflow, or resource limit
exceeded. This is
a) Read error
b) Boot error
c) Logical error
d) System error

6. The assumption that hardware errors and bugs in the software bring the system to a halt,
but do not corrupt the non-volatile storage contents, is known as the
a) Stop assumption
b) Fail assumption
c) Halt assumption
d) Fail-stop assumption

7. Which kind of failure loses its data in head crash or failure during a transfer operation.
a) Transaction failure
b) System crash
c) Disk failure
d) All of the mentioned
8. The failure occurred sufficiently early during the transfer that the destination block
remains intact.
a) Partial Failure
b) Total failure
c) Successful completion
d) Data transfer failure

9. Which of the following causes system to crash


a) Bug in software
b) Loss of volatile data
c) Hardware malfunction
d) All of the mentioned

10. The log is a sequence of _________ recording all the update activities in the database.
a) Log records
b) Records
c) Entries
d) Redo

11. In the ___________ scheme, a transaction that wants to update the database first creates
a complete copy of the database.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned

12. The ____________ scheme uses a page table containing pointers to all pages; the page
table itself and all updated pages are copied to a new location.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned

13. The current copy of the database is identified by a pointer, called ____________ which
is stored on disk.
a) Db-pointer
b) Update log
c) Update log records
d) All of the mentioned

14. If a transaction does not modify the database until it has committed, it is said to use the
___________ technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
15. If database modifications occur while the transaction is still active, the transaction is
said to use the ___________technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo

16. ____________ using a log record sets the data item specified in the log record to the
old value.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo

17. In the __________ phase, the system replays updates of all transactions by scanning the
log forward from the last checkpoint.
a) Repeating
b) Redo
c) Replay
d) Undo

18. The actions which are played in the order while recording it is called ______________
history.
a) Repeating
b) Redo
c) Replay
d) Undo

19. A special redo-only log record < Ti, Xj, V1> is written to the log, where V1 is the value
being restored to data item Xj during the rollback. These log records are sometimes
called
a) Log records
b) Records
c) Compensation log records
d) Compensation redo records

20. In order to reduce the overhead in retrieving the records from the storage space we use
a) Logs
b) Log buffer
c) Medieval space
d) Lower records

21. The order of log records in the stable storage ____________ as the order in which they
were written to the log buffer.
a) Must be exactly the same
b) Can be different
c) Is opposite
d) Can be partially same

22. Before a block of data in main memory can be output to the database, all log records
pertaining to data in that block must have been output to stable storage. This is
a) Read-write logging
b) Read-ahead logging
c) Write-ahead logging
d) None of the mentioned

23. Writing the buffered log to __________ is sometimes referred to as a log force.
a) Memory
b) Backup
c) Redo memory
d) Disk

24. The _______________ policy, allows a transaction to commit even if it has modified
some blocks that have not yet been written back to disk.
a) Force
b) No-force
c) Steal
d) No-steal

25. The ___________ policy, allows the system to write modified blocks to disk even if the
transactions that made those modifications have not all committed.
a) Force
b) No-force
c) Steal
d) No-steal

26. Locks on buffer blocks are unrelated to locks used for concurrency-control of
transactions, and releasing them in a non-two-phase manner does not have any
implications on transaction serializability. This is
a) Latches
b) Swap Space
c) Dirty Block
d) None of the mentioned

27. The __________________ contains a list of blocks that have been updated in the
database buffer.
a) Latches
b) Swap Space
c) Dirty Block
d) None of the mentioned
28. The operating system reserves space on disk for storing virtual-memory pages that are
not currently in main memory; this space is called
a) Latches
b) Swap Space
c) Dirty Block
d) None of the mentioned

29. Which of the following is used for manufacturing chips?


a) Control bus
b) Control unit
c) Parity unit
d) Semiconductor

30. The ALU of a computer normally contains a number of high speed storage element
called
a) Semiconductor memory
b) Registers
c) Hard disks
d) Magnetic disk

31. Which of the following is used only for data entry and storage, and never for
processing?
a) Mouse
b) Dumb terminal
c) Micro computer
d) Dedicated data entry system

32. Non-volatile storage needs to have a _________ where the loses in future can be
recovered.
a) Dump
b) Recover place
c) Disk
d) Redo plan

33. ARIES uses a ___________ to identify log records, and stores it in database pages.
a) Log sequence number
b) Log number
c) Lock number
d) Sequence

34. ARIES supports ___________ operations, which are physical in that the affected page
is physically identified, but can be logical within the page.
a) Physiological redo
b) Physiological undo
c) Logical redo
d) Logical undo
35. ______________ is used to minimize unnecessary redos during recovery.
a) Dirty page table
b) Page table
c) Dirty redo
d) All of the mentioned

36. __________ scheme that records only information about dirty pages and associated
information and does not even require of writing dirty pages to disk.
a) Fuzzy logic
b) Checkpoints
c) Fuzzy-checkpoint
d) Logical checkpoint

37. Whenever an update operation occurs on a page, the operation stores the LSN of its log
record in the _______ field of the page.
a) LSN
b) ReadLSN
c) PageLSN
d) RedoLSN

38. There are special redo-only log records generated during transaction rollback, called
_________ in ARIES.
a) Compensation log records
b) Read log records
c) Page log records
d) Redo log records

39. The __________________ contains a list of pages that have been updated in the
database buffer.
a) Dirty page table
b) Page table
c) Dirty redo
d) All of the mentioned

40. ___________ determines which transactions to undo, which pages were dirty at the
time of the crash, and the LSN from which the redo pass should start.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned

41. __________ starts from a position determined during analysis, and performs a redo,
repeating history, to bring the database to a state it was in before the crash.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned

42. ______________ rolls back all transactions that were incomplete at the time of crash.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned

43. Which lock should be obtained to prevent a concurrent transaction from executing a
conflicting read, insert or delete operation on the same key value.
a) Higher-level lock
b) Lower-level lock
c) Read only lock
d) Read write

44. Once the lower-level lock is released, the operation cannot be undone by using the old
values of updated data items, and must instead be undone by executing a compensating
operation; such an operation is called
a) Logical operation
b) Redo operation
c) Logical undo operation
d) Undo operation

45. Which of the following is used for undo operations alone?


a) Logical logging
b) Physical logging
c) Physical log records
d) Physical logging and Physical log records

46. Redo operations are performed exclusively using


a) Logical logging
b) Physical logging
c) Physical log records
d) Both Physical logging and Physical log records

47. To perform logical redo or undo, the database state on disk must be operation
___________ that is, it should not have partial effects of any operation.
a) Persistent
b) Resistant
c) Consistent
d) None of the mentioned

48. An operation is said to be __________ if executing it several times in a row gives the
same result as executing it once.
a) Idempotent
b) Changed
c) Repetitive
d) All of the above

49. If ___________ are not obtained in undo operation it will cause problem in undo-
phase.
a) Higher-level lock
b) Lower-level lock
c) Read only lock
d) Read write

50. The remote backup site is sometimes also called the


a) Primary Site
b) Secondary Site
c) Tertiary Site
d) None of the mentioned

51. Remote backup system must be _________ with the primary site.
a) Synchronised
b) Separated
c) Connected
d) Detached but related

52. The backup is taken by


a) Erasing all previous records
b) Entering the new records
c) Sending all log records from primary site to the remote backup site
d) Sending selected records from primary site to the remote backup site

53. When the __________ the backup site takes over processing and becomes the primary.
a) Secondary fails
b) Backup recovers
c) Primary fails
d) None of the mentioned

54. The simplest way of transferring control is for the old primary to receive __________
from the old backup site.
a) Undo logs
b) Redo Logs
c) Primary Logs
d) All of the mentioned

55. The time to process the remote backup can be reduced by


a) Flags
b) Breakpoints
c) Redo points
d) Checkpoints

56. A transaction commits as soon as its commit log record is written to stable storage at
the primary site. This is
a) One Safe
b) Two Safe
c) Two-very Safe
d) Very Safe

57. A transaction commits as soon as its commit log record is written to stable storage at
the primary and the backup site. This is
a) One Safe
b) Two Safe
c) Two-very Safe
d) Very Safe

58. If only the primary is active, the transaction is allowed to commit as soon as its commit
log record is written to stable storage at the primary site. This is
a) One Safe
b) Two Safe
c) Two-very Safe
d) Very Safe

You might also like