CH 10 Questions
CH 10 Questions
CH 10 Questions
Assume that the following sequence of events occurs: T1 = access data items X and Y T2 = access data items
Y and X This is called a(n) ____.
a. inconsistent state
b. failed transaction
c. deadly embrace
d. rollback
2. If any of the SQL statements in a transaction fail, the entire transaction is ____ to the original database state
that existed before the transaction started.
a. diverted
b. abandoned
c. rolled back
d. completed
3. The scheduler facilitates data ____ to ensure that two transactions do not update the same data element at the
same time.
a. parsing
b. isolation
c. integrity
d. uniqueness
5. If several concurrent transactions are executed over the same data set and the second transaction updates the
database before the first transaction is finished, the ____ property is violated and the database is no longer
consistent.
a. atomicity
b. consistency
c. isolation
d. durability
10. All transactions are controlled and executed by the DBMS (subject to some limitations) to guarantee
database ____.
a. integrity
b. uniqueness
c. consistency
d. design
11. Deadlocks are possible only when one of the transactions wants to obtain a(n) ____ lock on a data item.
a. binary
b. exclusive
c. shared
d. complete
14. A database ____ is caused when two transactions wait for each other to unlock data.
a. exclusive lock
b. shared lock
c. deadlock
d. binary lock
15. In database terms, a(n) ____ is any action that reads from and/or writes to a database.
a. session
b. transaction
c. lock
d. interaction
16. In a ____ lock, the entire database is locked, thus preventing the use of any tables in the database by
transaction T2 while transaction Tl is being executed.
a. database-level
b. table-level
c. page-level
d. row-level
17. According to the ANSI SQL standard, when does a transaction begin?
a. with use of the START command
b. when the first SQL statement is encountered
c. with the BEGIN command
d. with the BEGIN TRANSACTION command
19. When a(n) ____ statement is reached, all changes are permanently recorded within the database.
a. COMMIT
b. ROLLBACK
c. DONE
d. EXIT
20. Although the ____ locking approach improves the availability of data, its management requires high
overhead.
a. database-level
b. table-level
c. page-level
d. row-level
21. In a(n) ____ backup of the database, only the last modifications to the database are copied.
a. full
b. incomplete
c. differential
d. transaction log
22. The Oracle RDBMS uses the ____ statement to declare a new transaction start and its properties.
a. BEGIN
b. SET TRANSACTION
c. BEGIN TRANSACTION
d. COMMIT
3. The objective of ____ control is to ensure the serializability of transactions in a multiuser database
environment.
a. concurrency
b. transaction
c. isolation
d. integrity
24. All lock information is managed by a ____, which is responsible for assigning and policing the locks used
by the transactions.
a. scheduler
b. DBMS
c. lock manager
d. locking agent
25. ____ occur when a transaction calculates some summary (aggregate) functions over a set of data while other
transactions are updating the data.
a. Lost updates
b. Uncommitted data changes
c. Inconsistent retrievals
d. Incomplete retrievals
26. In the ____ scheme for time stamping concurrency control, the older transaction rolls back the younger
transaction and reschedules it.
a. wound/wait
b. die/wait
c. wait/die
d. older/younger
27. If several concurrent transactions are executed over the same data set and the second transaction updates the
database before the first transaction is finished, the ____ property is violated and the database is no longer
consistent.
a. atomicity
b. consistency
c. isolation
d. durability
28. When a program is abnormally terminated, the equivalent of a ____ command occurs.
a. COMMIT
b. ROLLBACK
c. QUIT
d. EXIT
30. The three basic techniques to control deadlocks are: deadlock ____, deadlock detection, and deadlock
avoidance.
a. prevention
b. prohibition
c. rollback
d. commits
32. A(n) ____ lock exists when concurrent transactions are granted Read access on the basis of a common lock.
a. binary
b. field-level
c. shared
d. exclusive
33. A database ____ is caused when two transactions wait for each other to unlock data.
a. exclusive lock
b. shared lock
c. deadlock
d. binary lock
34. With a ____ lock, the DBMS allows concurrent transactions to access different rows of the same table even
when the rows are located on the same page.
a. database-level
b. table-level
c. page-level
d. row-level
35. Deadlocks are possible only when one of the transactions wants to obtain a(n) ____ lock on a data item.
a. binary
b. exclusive
c. shared
d. complete
36. A ____ database state is one in which all data integrity constraints are satisfied.
a. fixed
b. complete
c. consistent
d. secure
37. The ____ is a special DBMS program that establishes the order in which the operations within concurrent
transactions are executed.
a. executor
b. parser
c. locker
d. scheduler