0% found this document useful (0 votes)
642 views49 pages

DBMS MCQ Final

This document contains a multiple choice quiz on database management systems (DBMS) concepts. There are 31 multiple choice questions testing knowledge of data definition language (DDL), data manipulation language (DML), relational database concepts like tables, tuples, attributes, keys, relationships, and integrity constraints. The questions cover topics from the first two units of a DBMS course, including relational model concepts, schema, queries, triggers, and transaction management.

Uploaded by

Amit Kumar Sahu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
642 views49 pages

DBMS MCQ Final

This document contains a multiple choice quiz on database management systems (DBMS) concepts. There are 31 multiple choice questions testing knowledge of data definition language (DDL), data manipulation language (DML), relational database concepts like tables, tuples, attributes, keys, relationships, and integrity constraints. The questions cover topics from the first two units of a DBMS course, including relational model concepts, schema, queries, triggers, and transaction management.

Uploaded by

Amit Kumar Sahu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

DBMS MCQ

UNIT-1
1) Which of the following is generally used for performing tasks like creating the
structure of the relations, deleting relation?
a. DML(Data Manipulation Language)
b. Query
c. Relational Schema
d. DDL(Data Definition Language)

2) Which of the following provides the ability to query information from the
database and insert tuples into, delete tuples from, and modify tuples in the database?
a. DML(Data Manipulation Language)
b. DDL(Data Definition Language)
c. Query
d. Relational Schema

3) The given Query can also be replaced with_______:


SELECT name, course_id FROM instructor, teaches WHERE instructor_ID=
teaches_ID;
a. Select name,course_id from teaches,instructor where instructor_id=course_id;
b. Select name, course_id from instructor natural join teaches;
c. Select name, course_id from instructor;
d. Select course_id from instructor join teaches;
4) Which of the following is generally used for performing tasks like creating the
structure of the relations, deleting relation?
a. DML(Data Manipulation Language)
b. Query
c. Relational Schema
d. DDL(Data Definition Language)

Answer: D
5) Which of the following provides the ability to query information from the
database and insert tuples into, delete tuples from, and modify tuples in the database?
a. DML(Data Manipulation Language)
b. DDL(Data Definition Language)
c. Query
d. Relational Schema

Answer: A
6) The given Query can also be replaced with_______:
1. SELECT name, course_id
2. FROM instructor, teaches
3. WHERE instructor_ID= teaches_ID;

a. Select name,course_id from teaches,instructor where instructor_id=course_id;


b. Select name, course_id from instructor natural join teaches;
c. Select name, course_id from instructor;
d. Select course_id from instructor join teaches;

Answer: B
7) Which one of the following given statements possibly contains the error?
a. select * from emp where empid = 10003;
b. select empid from emp where empid = 10006;
c. select empid from emp;
d. select empid where empid = 1009 and Lastname = 'GELLER';
8) Ready the Query carefully:
1. SELECT emp_name
2. FROM department
3. WHERE dept_name LIKE ' _____ Computer Science';

In the above-given Query, which of the following can be placed in the Query's blank
portion to select the "dept_name" that also contains Computer Science as its ending
string?
a. &
b. _
c. %
d. $

10) Rows of a relation are known as the _______.


e. Degree
f. Tuples
g. Entity
h. All of the above

11) Which one of the following is a type of Data Manipulation Command?


a) Create
b) Alter
c) Delete
d) All of the above

12). In case of any shut down during transaction before commit which of the
following statement is done automatically ?
A. View
B. Commit
C. Rollback
D. Flashback
13) The term "TCL" stands for_____.
a) Ternary Control Language
b) Transmission Control Language
c) Transaction Central Language
d) Transaction Control Language

14) Which one of the following commands is used for removing (or deleting) a
relation forms the SQL database?
a. Delete
b. Drop
c. Remove
d. All of the above

15). Which of the following makes the transaction permanent in the database ?
A. View
B. Commit
C. Rollback
D. Flashback
16). A system is in a ______ state if there exists a set of transactions such that every
transaction in the set is waiting for another transaction in the set.
A. Idle
B. Waiting
C. Deadlock
D. Ready
17). In order to undo the work of transaction after last commit which one should be
used ?
A. View
B. Commit
C. Rollback
D. Flashback
18). In order to maintain the consistency during transactions database provides
A. Commit
B. Atomic
C. Flashback
D. Retain
19). When transaction Ti requests a data item currently held by Tj , Ti is allowed to
wait only if it has a timestamp larger than that of Tj (that is, Ti is younger than Tj ).
Otherwise, Tj is rolled back (Tj is wounded by Ti ). This is
A. Wait-die
B. Wait-wound
C. Wound-wait
D. Wait
20). The deadlock state can be changed back to stable state by using _____________
statement.
A. Commit
B. Rollback
C. Savepoint
D. Deadlock
21). When transaction Ti requests a data item currently held by Tj , Ti is allowed to
wait only if it has a timestamp smaller than that of Tj (that is, Ti is older than Tj ).
Otherwise, Ti is rolled back (dies). This is
A. Wait-die
B. Wait-wound
C. Wound-wait
D. Wait
22). A deadlock exists in the system if and only if the wait-for graph contains a
___________.
A. Cycle
B. Direction
C. Bi-direction
D. Rotation
23). Which refers to a property of computer to run several operation simultaneously
and possible as computers await response of each other
a) Concurrency
b) Deadlock
c) Backup
d) Recovery
24). Which of the following is a procedure for acquiring the necessary locks for a
transaction where all necessary locks are acquired before any are released?
a) Record controller
b) Exclusive lock
c) Authorization rule
d) Two phase lock
25). Which one of the following is a failure to a system
a) Boot crash
b) Read failure
c) Transaction failure
d) All of the mentioned
26). If a transaction does not modify the database until it has committed, it is said to
use the ___________ technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
27). The ____________ scheme uses a page table containing pointers to all pages;
the page table itself and all updated pages are copied to a new location.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned
28). A __________ is a special kind of a store procedure that executes in response to
certain action on the table like insertion, deletion or updation of data.
a) Procedures
b) Triggers
c) Functions
d) None of the mentioned
29). What are the after triggers?
a) Triggers generated after a particular operation

b) These triggers run after an insert, update or delete on a table


c) These triggers run after an insert, views, update or delete on a table
d) All of the mentioned
30). Triggers ________ enabled or disabled
a) Can be
b) Cannot be
c) Ought to be
d) Always
31). Which of the following deletes all tuples in the instructor relation for those
instructors associated with a department located in the Watson building which is in
department relation.
a)
DELETE FROM instructor
WHERE dept_name IN 'Watson';
b) DELETE FROM department
WHERE building='Watson';
c) DELETE FROM instructor
WHERE dept_name IN (SELECT dept name
FROM department
WHERE building = ’Watson’);
d) None of the mentioned
answer(C)
Unit-2
1) Which of the following is not a characteristic of a relational database model?

A. Table

B. Tree like structure

C. Complex logical relationship

D. Records

B. Tree like structure

2) Field is otherwise called as ..........of the record

A. data item

B. data type

C. value

D. variable

A. data item

3) A table can have only one

A. Secondary key

B. Alternate key

C. Unique key

D. Primary key

D. Primary key

4) A field can be called as ........... in relation context.

A. random file

B. direct file

C. attribute

D. tuple

C. attribute
5) In the relational modes, cardinality is termed as
A. Number of tuples

B. Number of attributes

C. Number of tables

D. Number of constraints
A. Number of tuples

6) The .........is used for creating and destroying table, indexes and other forms of structures.

A. data manipulation language

B. data control language

C. transaction control language

D. data definition language

D. data definition language

7) The view of total database content is

A. Conceptual view

B. Internal view

C. External view

D. Physical view

A. Conceptual view

8) The .............refers to the way data is organized in and accessible from DBMS.

A. database hierarchy

B. data organization

C. data sharing

D. data model

D. data model
9) Architecture of the database can be viewed as

A. two levels

B. four levels

C. three levels

D. one level

C. three levels

10)introduced the relational database rules.

A. Atul kahate

B. James Gossling

C. EF Codd

D. Dennies Rithchie

C. EF Codd

11) In a relational model, relations are termed as

A. Tuples

B. Attributes

C. Tables

D. Rows

C. Tables

12) When the values in one or more attributes being used as a foreign key must exist in another set of
one or more attributes in another table, we have created a(n) ........

A. transitive dependency

B. insertion anomaly

C. referential integrity constraint

D. normal form

C. referential integrity constraint


13) In the architecture of a database system external level is the

A. physical level

B. logical level

C. conceptual level

D. view level

D. view level

14) A functional dependency is a relationship between or among .......

A. tables

B. rows

C. relations

D. attributes

D. attributes

15) Related fields in a database are grouped to form a

A. data file

B. data record

C. menu

D. bank

B. data record

16)is, a table have more than one set of attributes that could be chosen as the key

A. foreign key

B. integrity key

C. relationship

D. candidate key

D. candidate key
17) The database environment has all of the following components except.

A. users

B. separate files

C. database

D. database administrator

A. users

18) The operation of eliminating columns in a table done by .......... operation.

A. Restrict

B. Project

C. Union

D. Divide

B. Project

19) The way a particular application views the data from the database that the application uses is a

A. module

B. relational model

C. schema

D. sub schema

D. sub schema

20)is a condition specified on a database schema and restricts the data that can be stored in an
instance of the database.

A. Key Constraint

B. Check Constraint

C. Foreign key constraint

D. integrity constraint

B. Check Constraint
21.A relational database developer refers to a record as

A. a criteria

B. a relation

C. a tuple

D. an attribute

C. a tuple

22.keyword is used to find the number of values in a column.

A. TOTAL

B. COUNT

C. ADD

D. SUM

B. COUNT

23.An advantage of the database management approach is

A. data is dependent on programs

B. data redundancy increases

C. data is integrated and can be accessed by multiple programs

D. none of the above


C. data is integrated and can be accessed by multiple programs

24.The collection of information stored in a database at a particular moment is called as ......

A. schema

B. instance of the database

C. data domain

D. independence

B. instance of the database


25.Data independence means

A. data is defined separately and not included in programs.

B. programs are not dependent on the physical attributes of data

C. programs are not dependent on the logical attributes of data

D. both B and C

D. both B and C

26.A......... is used to define overall design of the database

A. schema

B. application program

C. data definition language

D. code

A. schema

27.Key to represent relationship between tables is called

A. primary key

B. secondary key

C. foreign key

D. none of the above

C. foreign key

28.Grant and revoke are ........ statements.

A. DDL

B. TCL

C. DCL

D. DML
D. DML

29.BMS helps achieve

A. Data independence

B. Centralized control of data

C. Neither A nor B

D. Both A and B

D. Both A and B

30.command can be used to modify a column in a table

A. alter

B. update

C. set

D. create

A. alter

31.The RDBMS terminology for a row is

A. tuple

B. relation

C. attribute

D. degree
A. tuple

32.To change column value in a table the command can be used.

A. create

B. insert

C. alter

D. update
D. update

33.The full form of DDL is

A. Dynamic Data Language

B. Detailed Data Language

C. Data Definition Language

D. Data Derivation Language

C. Data Definition Language

34.To pass on granted privileges to other user the ........ clause is used

A. create option

B. grant option
C. update option

D. select option

B. grant option

35.A set of possible data values is called

A. attribute

B. degree

C. tuple

D. domain

D. domain

36.is critical in formulating database design.

A. row column order

B. number of tables

C. functional dependency

D. normalizing

C. functional dependency

37.A primary key if combined with a foreign key creates


A. Parent-Child relationship between the tables that connect them

B. Many to many relationship between the tables that connect them

C. Network model between the tables that connect them

D. None of the above

A. Parent-Child relationship between the tables that connect them

38.A............. represents the number of entities to which another entity can be associated

A. mapping cardinality

B. table

C. schema
D. information
A. mapping cardinality

39.Which two files are used during operation of the DBMS

A. Query languages and utilities

B. DML and query language

C. Data dictionary and transaction log

D. Data dictionary and query language

C. Data dictionary and transaction log

40.A............. is a set of column that identifies every row in a table.

A. composite key

B. candidate key

C. foreign key

D. super key

D. super key
Unit-3
1) The language that requires a user to specify the data to be retrieved without specifying exactly how
to get it is

A. Procedural DML

B. Non-Procedural DML

C. Procedural DDL

D. Non-Procedural DDL

B. Non-Procedural DML

2) Which two files are used during operation of the DBMS?

A. Query languages and utilities

B. DML and query language

C. Data dictionary and transaction log

D. Data dictionary and query language


C. Data dictionary and transaction log

3) The database schema is written in

A. HLL

B. DML

C. DDL

D. DCL

C. DDL

4) The way a particular application views the data from the database that the application uses is a

A. module

B. relational model

C. schema

D. sub schema

D. sub schema

5) The relational model feature is that there

A. is no need for primary key data


B. is much more data independence than some other database models

C. are explicit relationships among records.

D. are tables with many dimensions

B. is much more data independence than some other database models

6) Which one of the following statements is false?

A. The data dictionary is normally maintained by the database administrator

B. Data elements in the database can be modified by changing the data dictionary.

C. The data dictionary contains the name and description of each data element.

D. The data dictionary is a tool used exclusively by the database administrator.

B. Data elements in the database can be modified by changing the data dictionary.

7) Which of the following are the properties of entities?

A. Groups

B. Table

C. Attributes

D. Switchboards

C. Attributes

8) Which database level is closest to the users?

A. External

B. Internal

C. Physical

D. Conceptual

A. External

9) Which are the two ways in which entities can participate in a relationship?

A. Passive and active

B. Total and partial

C. Simple and Complex


D. All of the above

B. Total and partial

10)data type can store unstructured data

A. RAW

B. CHAR

C. NUMERIC

D. VARCHAR
A. RAW

11.What is a data integrity?

A. It is the data contained in database that is non redundant.

B. It is the data contained in database that is accurate and consistent.

C. It is the data contained in database that is secured.

D. It is the data contained in database that is shared.

B. It is the data contained in database that is accurate and consistent.

12.As per equivalence rules for query transformation, selection operation distributes over

A. Union

B. Intersection

C. Set difference

D. All of the above

All of the above

13.In SQL the word 'natural' can be used with

A. inner join
B. full outer join

C. right outer join

D. all of the above

inner join

14.Which of the following relational algebraic operations is not from set theory?

A. Union

B. Intersection

C. Cartesian Product

D. Select

Select

15.An entity set that does not have sufficient attributes to form a primary key is a

A. strong entity set

B. weak entity set

C. simple entity set

D. primary entity set

weak entity set

16.In case of entity integrity, the primary key may be

A. not Null

B. Null

C. both Null and not Null

D. any value

not Null
17.A logical schema

A. is the entire database.

B. is a standard way of organizing information into accessible parts.

C. describes how data is actually stored on disk

D. both A and C

is the entire database.

18.Which of the operations constitute a basic set of operations for manipulating relational data?

A. Predicate calculus

B. Relational calculus

C. Relational algebra

D. None of the above

Relational algebra

19.Which of the following is another name for weak entity?

A. Child

B. Owner

C. Dominant

D. All of the above


Dominant

20.Which of the following is record based logical model?

A. Network Model

B. Object oriented model


C. E-R model

D. None of the above

Network Model

21.A file manipulation command that extracts some of the records from a file is called

A. SELECT

B. PROJECT

C. JOIN

D. PRODUCT

SELECT

22.In E-R Diagram derived attribute are represented by

A. Ellipse

B. Dashed ellipse

C. Rectangle

D. Triangle

Dashed ellipse

23.The natural join is equal to

A. Cartesian Product

B. Combination of Union and Cartesian product

C. Combination of selection and Cartesian product

D. Combination of projection and Cartesian product

Combination of projection and Cartesian product


24.In E-R diagram relationship type is represented by

A. Ellipse

B. Dashed ellipse

C. Rectangle

D. Diamond

Diamond

25.In E-R diagram generalization is represented by

A. Ellipse

B. Dashed ellipse

C. Rectangle

D. Triangle

Triangle

26.A table joined with itself is called

A. Join

B. Self Join

C. Outer Join

D. Equi Join

Self Join
27.means multiple copies of the same data items.

A. Data reduction

B. Data integrity

C. Data consistency

D. Data redundancy

Data redundancy

28.Different values for the same data item is referred to as .......

A. data consistency

B. data inconsistency

C. data integrity

D. data duplication

data inconsistency

29.The ............returns row after combining two tables based on common values.

A. difference

B. product

C. join

D. union
join

30.The ............can be used to ensure database integrity.

A. entity integrity

B. database constraints
C. referential integrity

D. cardinality

database constraints
unit-4

1) Which of the following is not a recovery technique?

A. Deferred update

B. Immediate update

C. Two-phase commit

D. Recovery management

C. Two-phase commit

2.Checkpoints are a part of

A. Recovery measures

B. Security measures

C. Concurrency measures

D. Authorization measures

A. Recovery measures

3.deals with soft errors, such as power failures.

A. system recovery

B. media recovery

C. database recovery

D. failure recovery
D. failure recovery

4.is an essential part of any backup system.

A. Filter

B. Recovery

C. Security

D. Scalability

C. Security

5.Media recovery deals with ...........

A. disk errors

B. hard errors

C. system errors

D. power failures

A. disk errors

6.For a backup/restore system, ................. is a prerequisite for service in a enterprise.

A. Filter

B. Recovery

C. Security

D. Scalability

D. Scalability
7.Failure recovery and media recovery fall under ........

A. transaction recovery

B. database recovery

C. system recovery

D. value recovery

C. system recovery

8.The ............consists of the various applications and database that play a role in a backup and recovery

strategy.

A. Recovery Manager Environment

B. Recovery Manager Suit

C. Recovery Manager File

D. Recovery Manager Database

A. Recovery Manager environment

9.In which the database can be restored up to the last consistent state after the system failure?

A. Backup

B. Recovery

C. Both

D. None

B. Recovery
10.A............. is a block of Recovery Manager(RMAN)job commands that is stored in the recovery catalog.

A. recovery procedure

B. recovery block

C. stored block

D. stored script

D. stored script

11.In log based recovery, the log is sequence of .........

A. filter

B. records

C. blocks

D. numbers

B. records

12.The enrolling of a database in a recovery catalog is called .........

A. setup

B. registration

C. startup

D. enrollment

B. registration
13.is an alternative of log based recovery.

A. Disk recovery

B. Shadow paging

C. Dish shadowing

D. Crash recovery

B. Shadow paging

14.Most backup and recovery commands in .............. are executed by server sessions.

A. Backup Manager

B. Recovery Manager

C. Backup and Recovery Manager

D. Database Manager

B. Recovery Manager

15.systems typically allows to replace failed disks without stopping access to the system.

A. RAM

B. RMAN

C. RAD

D. RAID

D. RAID
16.An ............. is an exact copy of a single data file, archived redo log file, or control file.

A. image copy

B. data file copy

C. copy log

D. control copy

A. image copy

17.known as memory-style error correcting-code(ECC) organization, employs parity bits.

A. RAID level 1

B. RAID level 2

C. RAID level 3

D. RAID level 4

B. RAID level 2

18.The remote backup site is sometimes called the ..............site.

A. primary

B. secondary

C. ternary

D. None of the above

19.EXP command is used ...........

A. to take Backup of the Oracle Database


B. to import data from the exported dump file

C. to create Rollback segments

D. to create Schedule

A. to take Backup of the Oracle Database

20.The simplest approach to introducing redundancy is to duplicate every disk is called .....

A. mirroring

B. imaging

C. copying

D. All of the above

A. mirroring
21) If the transaction is rolled back, all the database changes made inside the transaction are ......

A. made permanent

B. made temporary

C. copied to the log

D. undone

D. undone

22.Which of the following is not a property of transactions?

A. Atomicity

B. Concurrency

C. Isolation

D. Durability

B. Concurrency

23.A......... ensures that transactions are performed as expected.

A. transaction processing monitor

B. transaction procedure monitor

C. isolation monitor

D. transaction log
A. transaction processing monitor

24.A transaction that completes its execution successfully is said to be .......

A. committed

B. rolled back

C. partially committed

D. Aborted

A. committed

25.means that a transaction must execute exactly once completely or not at all.

A. durability

B. consistency

C. atomicity

D. isolation

C. atomicity

26.Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R

A. It will result in a deadlock situation

B. It will immediately be rejected

C. It will immediately be granted

D. It will be granted as soon as it is released by A


C. It will immediately be granted

27.means that when it ends, a transaction must leave the database in a consistent state.

A. Data isolation

B. Data duration

C. Data consistency

D. Data non-reputability

C. Data consistency

28.The number of transactions executed in a given amount of time is called .........

A. utilization

B. execution rate

c. throughput

D. atomicity

c. throughput

29.Isolation means ......

A. transaction must not interfere with each other

B. transaction must interfere with each other

C. transaction must be in consistent state

D. transaction must be executed immediately

A. transaction must not interfere with each other


30.Which of the following ensures the atomicity of the transaction?

A. Transaction management component of DBMS

B. Application Programmer

C. Concurrency control component of DBMS

D. Recovery management component of DBMS

A. Transaction management component of DBMS


Unit-5

1means that a transaction must make its changes permanent to the database ends.

A. isolation

B. locking

C. durability

D. consistency

C. durability

2.Throughput means

A. number of transactions that is committed in one hour

B. number of operations in a transaction

C. number of transaction that can be aborted in a given amount of time

D. number of transaction that can be executed in a given amount of time

D. number of transaction that can be executed in a given amount of time


3.deals with individual transactions.

A. isolate transactions

B. transaction recovery

C. system recovery

D. media recovery

B. transaction recovery

4.The part of a database management system which ensures that the data remains in a consistent state
is

A. authorization and integrity manager

B. buffer manager

C. transaction manager

D. file manager

C. transaction manager

5.protocol is used to perform multiple transactions that execute on different database.

A. commit

B. two phase lock

C. two phase commit

D. locking

C. two phase commit


6.A transaction can do read and write operation on a data item when it acquires ......

A. read mode

B. exclusive mode

C. shared mode

D. write mode

B. exclusive mode

7.In .............. one transaction overwrites the changes of another transaction.

A. uncommitted read problem

B. lost update problem

C. update lost problem

D. dirty read problem

B. lost update problem

8.Isolation of the transactions is ensured by

A. Transaction management

B. Application programmer

C. Concurrency control

D. Recovery management

C. Concurrency control
9.In dirty read problem.......

A. one transaction reads an uncommitted value of another transaction

B. one transaction reads the committed value for another transaction

C. one transaction reads another transaction

D. one transaction commits another transaction.

A. one transaction reads an uncommitted value of another transaction

10.A transaction can do only read operation and not write operation on a data item when it acquires

....... lock.

A. read mode

B. exclusive mode

C. shared mode

D. write mode

C. shared mode
1) In the ............ , one transaction inserts a row in the table while the other transaction is half way
through its browsing of table.

A. transaction read problem

B. one way read problem

C. serial read problem

D. phantom read problem

ans D

2) Transaction processing is associated with everything below except.

A. producing detail, summery, or exception reports

B. recording a business activity

C. confirming an action or triggering a response

D. maintaining data

ans C

3)helps solve concurrency problem.

A. locking

B. transaction monitor

C. transaction serializability

D. two phase commit

ans

4) If a transaction acquires a shared lock, then it can perform ............. operation.

A. read

B. write
C. read and write

D. update

ans

5.If a transaction obtains a shared lock on a row, it means that the transaction wants to that row.

A. write

B. insert

C. execute

D. read

ans D

6.The node where the distributed transaction originates is called the .......

A. local coordinator

B. starting coordinator

C. global coordinator

D. originating node

ans C

7.If a transaction obtains an exclusive lock on a row, it means that the transaction wants to .............that

row.

A. select

B. update

C. view
D. read

ans B

8.If a transaction acquires exclusive lock, then it can perform ............. operation.

A. read

B. write

C. read and write

D. update

ans C

9.is a specific concurrency problem wherein two transactions depend on each other for

something.

A. phantom read problem

B. transaction read problem

C. deadlock

D. locking

ans C

10.If a database server is referenced in a distributed transaction, the value of its commit point strength
determines which role it plays in the .........

A. two phase commit

B. two phase locking

C. transaction locking

D. checkpoints

ans A
11.Transaction.............ensures that the transaction are being executed successfully.

A. concurrency

B. consistency

C. serialisability

D. non serialiasability

ans C

12.The situation in which a transaction holds a data item and waits for the release of data item held by
some other transaction, which in turn waits for another transaction, is called .......

A. serialiable schedule

B. process waiting

C. concurrency

D. deadlock

ans D

13.protocol guarantees that a set of transactions becomes serialisable.

A. two phase locking

B. two phase commit

C. transaction locking

D. checkpoints

14.The global coordinator forgets about the transaction phase is called .........

A. Prepare phase

B. Commit phase

C. Forget phase

D. Global phase
Ans A

15.In two phase commit, ............. coordinates the synchronization of the commit or rollback operations.

A. database manager

B. central coordinator

C. participants

D. concurrency control manager

ans B

16.In two-phase locking protocol, a transaction obtains locks in ...........phase.

A. shrinking phase

B. growing phase

C. running phase

D. initial phase

ans B

17.A transaction processing system is also called as ........

A. processing monitor

B. transaction monitor

C. TP monitor

D. Monitor

Ans C

18.After the nodes are prepared, the distributed transaction is said to be ......

A. in-doubt
B. in-prepared

C. prepared transaction

D. in-node

ans A

19.In ........... , we have many mini transactions within a main transaction.

A. transaction control

B. chained transaction

C. nested transaction

D. calling transaction

ans B

20.In a two-phase locking protocol, a transaction release locks in ............ phase.

A. shrinking phase

B. growing phase

C. running phase

D. initial phase

ans A

21.A mechanism which ensures that simultaneous execution of more than one transaction does not lead to
any database inconsistencies is called ................. mechanism.

A. transaction control

B. transaction management

C. concurrency parallelism

D. concurrency control

Ans D
22.The transaction wants only to read the data item of mode is called as .......

A. Exclusive Mode

B. Shared Mode

C. Inclusive Mode

D. Unshared Mode

Ans B

23.Any execution of a set of transactions is called as its .........

A. non-serial schedule

B. serial schedule

C. schedule

D. interleaved schedule

Ans C

24.is program or set of program that interacts with the database at some point in its execution.

A. A database system

B. A database application

C. Both

D. none

Ans B

25.component of a database is responsible for ensuring atomicity and durability.

A. recovery management

B. concurrency control

C. storage management
D. query evaluation engine

Ans A

26.The activity of ensuring atomicity in the presence of Transaction aborts is called ..........

A. transaction control

B. transaction management

C. transaction recovery

D. concurrency control
E. Ans C

27.A is a set of rules that state when a transaction may lock or unlock each of the data items in

the database

A. concurrency control

B. transaction control

C. validation control

D. locking protocol

Ans D

28.is a collection of programs performing all necessary action associated with a database.

A. Database associated

B. Database administrator

C. Database application

D. Database management system

Ans D
29.Which protocol permits release of exclusive locks only at the end of transaction?

A. Graph based protocol

B. Strict two phase locking protocol

C. Two phase locking protocol

D. Rigorous Two phase locking protocol

Ans B

30.The activity of providing Durability of the transaction is called .....

A. database control

B. transaction management

C. transaction recovery

D. database recovery

Ans D

You might also like