Adbms Unit 3 MCQ
Adbms Unit 3 MCQ
4. The system has entered an undesirable state (for example, deadlock), as a result of
which a transaction cannot continue with its normal execution. This is
a) Read error
b) Boot error
c) Logical error
d) System error
5. The transaction can no longer continue with its normal execution because of some
internal condition, such as bad input, data not found, overflow, or resource limit
exceeded. This is
a) Read error
b) Boot error
c) Logical error
d) System error
6. The assumption that hardware errors and bugs in the software bring the system to a halt,
but do not corrupt the non-volatile storage contents, is known as the
a) Stop assumption
b) Fail assumption
c) Halt assumption
d) Fail-stop assumption
7. Which kind of failure loses its data in head crash or failure during a transfer operation.
a) Transaction failure
b) System crash
c) Disk failure
d) All of the mentioned
8. The failure occurred sufficiently early during the transfer that the destination block
remains intact.
a) Partial Failure
b) Total failure
c) Successful completion
d) Data transfer failure
10. The log is a sequence of _________ recording all the update activities in the database.
a) Log records
b) Records
c) Entries
d) Redo
11. In the ___________ scheme, a transaction that wants to update the database first creates
a complete copy of the database.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned
12. The ____________ scheme uses a page table containing pointers to all pages; the page
table itself and all updated pages are copied to a new location.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned
13. The current copy of the database is identified by a pointer, called ____________ which
is stored on disk.
a) Db-pointer
b) Update log
c) Update log records
d) All of the mentioned
14. If a transaction does not modify the database until it has committed, it is said to use the
___________ technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
15. If database modifications occur while the transaction is still active, the transaction is
said to use the ___________technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
16. ____________ using a log record sets the data item specified in the log record to the
old value.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
17. In the __________ phase, the system replays updates of all transactions by scanning the
log forward from the last checkpoint.
a) Repeating
b) Redo
c) Replay
d) Undo
18. The actions which are played in the order while recording it is called ______________
history.
a) Repeating
b) Redo
c) Replay
d) Undo
19. A special redo-only log record < Ti, Xj, V1> is written to the log, where V1 is the value
being restored to data item Xj during the rollback. These log records are sometimes
called
a) Log records
b) Records
c) Compensation log records
d) Compensation redo records
20. In order to reduce the overhead in retrieving the records from the storage space we use
a) Logs
b) Log buffer
c) Medieval space
d) Lower records
21. The order of log records in the stable storage ____________ as the order in which they
were written to the log buffer.
a) Must be exactly the same
b) Can be different
c) Is opposite
d) Can be partially same
22. Before a block of data in main memory can be output to the database, all log records
pertaining to data in that block must have been output to stable storage. This is
a) Read-write logging
b) Read-ahead logging
c) Write-ahead logging
d) None of the mentioned
23. Writing the buffered log to __________ is sometimes referred to as a log force.
a) Memory
b) Backup
c) Redo memory
d) Disk
24. The _______________ policy, allows a transaction to commit even if it has modified
some blocks that have not yet been written back to disk.
a) Force
b) No-force
c) Steal
d) No-steal
25. The ___________ policy, allows the system to write modified blocks to disk even if the
transactions that made those modifications have not all committed.
a) Force
b) No-force
c) Steal
d) No-steal
26. Locks on buffer blocks are unrelated to locks used for concurrency-control of
transactions, and releasing them in a non-two-phase manner does not have any
implications on transaction serializability. This is
a) Latches
b) Swap Space
c) Dirty Block
d) None of the mentioned
27. The __________________ contains a list of blocks that have been updated in the
database buffer.
a) Latches
b) Swap Space
c) Dirty Block
d) None of the mentioned
28. The operating system reserves space on disk for storing virtual-memory pages that are
not currently in main memory; this space is called
a) Latches
b) Swap Space
c) Dirty Block
d) None of the mentioned
30. The ALU of a computer normally contains a number of high speed storage element
called
a) Semiconductor memory
b) Registers
c) Hard disks
d) Magnetic disk
31. Which of the following is used only for data entry and storage, and never for
processing?
a) Mouse
b) Dumb terminal
c) Micro computer
d) Dedicated data entry system
32. Non-volatile storage needs to have a _________ where the loses in future can be
recovered.
a) Dump
b) Recover place
c) Disk
d) Redo plan
33. ARIES uses a ___________ to identify log records, and stores it in database pages.
a) Log sequence number
b) Log number
c) Lock number
d) Sequence
34. ARIES supports ___________ operations, which are physical in that the affected page
is physically identified, but can be logical within the page.
a) Physiological redo
b) Physiological undo
c) Logical redo
d) Logical undo
35. ______________ is used to minimize unnecessary redos during recovery.
a) Dirty page table
b) Page table
c) Dirty redo
d) All of the mentioned
36. __________ scheme that records only information about dirty pages and associated
information and does not even require of writing dirty pages to disk.
a) Fuzzy logic
b) Checkpoints
c) Fuzzy-checkpoint
d) Logical checkpoint
37. Whenever an update operation occurs on a page, the operation stores the LSN of its log
record in the _______ field of the page.
a) LSN
b) ReadLSN
c) PageLSN
d) RedoLSN
38. There are special redo-only log records generated during transaction rollback, called
_________ in ARIES.
a) Compensation log records
b) Read log records
c) Page log records
d) Redo log records
39. The __________________ contains a list of pages that have been updated in the
database buffer.
a) Dirty page table
b) Page table
c) Dirty redo
d) All of the mentioned
40. ___________ determines which transactions to undo, which pages were dirty at the
time of the crash, and the LSN from which the redo pass should start.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned
41. __________ starts from a position determined during analysis, and performs a redo,
repeating history, to bring the database to a state it was in before the crash.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned
42. ______________ rolls back all transactions that were incomplete at the time of crash.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned
43. Which lock should be obtained to prevent a concurrent transaction from executing a
conflicting read, insert or delete operation on the same key value.
a) Higher-level lock
b) Lower-level lock
c) Read only lock
d) Read write
44. Once the lower-level lock is released, the operation cannot be undone by using the old
values of updated data items, and must instead be undone by executing a compensating
operation; such an operation is called
a) Logical operation
b) Redo operation
c) Logical undo operation
d) Undo operation
47. To perform logical redo or undo, the database state on disk must be operation
___________ that is, it should not have partial effects of any operation.
a) Persistent
b) Resistant
c) Consistent
d) None of the mentioned
48. An operation is said to be __________ if executing it several times in a row gives the
same result as executing it once.
a) Idempotent
b) Changed
c) Repetitive
d) All of the above
49. If ___________ are not obtained in undo operation it will cause problem in undo-
phase.
a) Higher-level lock
b) Lower-level lock
c) Read only lock
d) Read write
51. Remote backup system must be _________ with the primary site.
a) Synchronised
b) Separated
c) Connected
d) Detached but related
53. When the __________ the backup site takes over processing and becomes the primary.
a) Secondary fails
b) Backup recovers
c) Primary fails
d) None of the mentioned
54. The simplest way of transferring control is for the old primary to receive __________
from the old backup site.
a) Undo logs
b) Redo Logs
c) Primary Logs
d) All of the mentioned
56. A transaction commits as soon as its commit log record is written to stable storage at
the primary site. This is
a) One Safe
b) Two Safe
c) Two-very Safe
d) Very Safe
57. A transaction commits as soon as its commit log record is written to stable storage at
the primary and the backup site. This is
a) One Safe
b) Two Safe
c) Two-very Safe
d) Very Safe
58. If only the primary is active, the transaction is allowed to commit as soon as its commit
log record is written to stable storage at the primary site. This is
a) One Safe
b) Two Safe
c) Two-very Safe
d) Very Safe