0% found this document useful (0 votes)
12 views3 pages

DBMS

IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Uploaded by

denisritchie01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views3 pages

DBMS

IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Uploaded by

denisritchie01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

‌#1 ) Recoverable Schedules:

Schedules in which transactions commit only after all transactions whose changes they read
commit are called recoverable schedules.

‌#2 ) What is cursor in SQL?


Cursor is a Temporary Memory or Temporary Work Station. It is Allocated by Database Server at the
Time of Performing DML(Data Manipulation Language) operations on Table by User.

‌#3 ) List the components of client-server system.


The three major components in the client-server model: presentation, application logic, and data
storage.

‌#4)Define fat client


The fat server model places more function on the server. The fat client does the reverse. Groupware,
transaction and the web servers

‌ 5) List the methods used for recovery from the deadlock.


#
There are two approaches of breaking a Deadlock:
a) Process Termination: To eliminate the deadlock, we can simply kill one or more processes. ...
b) Resource Preemption: To eliminate deadlocks using resource preemption, we preempt some
resources from processes and give those resources to other processes.

‌ 6) List any two types of failures.


#
Abject Failure.
Glorious Failure.
Common Failure.
Predicted failure.

‌ 7) What are two levels for assigning privileges for discretionary


#
There are two levels of Discretionary privileges in the database system :
Account Level – Database Administrator specifies privileges that each account holds with out
depending on the relations in database. ...
Relation / Table Level – It is the second level of privileges which is applied to the relation level.

‌ 8) What is Transaction give example


#
The definition of a transaction is an exchange, or an instance where business is done or something is
bought or sold.

‌ 9) what is view
#
A view is a subset of a database that is generated from a user query and gets stored as a permanent
object.

‌ 10) Define term Trigger


#
A trigger is a special type of stored procedure that automatically runs when an event occurs in the
database server. DML triggers run when a user tries to modify data through a data manipulation
language (DML) event.

‌ 11)Define term Serial Schedule.


#
Schedules in which the transactions are executed non-interleaved, i.e., a serial schedule is one in
which no transaction starts until a running transaction has ended are called serial schedules.
‌ 12) What is time stamp?
#
Timestamp is a data type and function in Standard Structured Query Language (SQL) that lets us store
and work with both date and time data values, usually without specified time zones.

‌ 13) Define system log.


#
The system log (SYSLOG) is a direct access data set that stores messages and commands. It resides
in the primary job entry subsystem's spool space

‌ 14) Define cascading rollback.


#
A cascading rollback occurs in database systems when a transaction (T1) causes a failure and a
rollback must be performed.

‌ 15) State purpose of commit statement.


#
Use the COMMIT statement to end your current transaction and make permanent all changes
performed in the transaction. A transaction is a sequence of SQL statements

‌ 16) Define Exception?


#
An exception is a PL/SQL error that is raised during program execution, either implicitly by TimesTen
or explicitly by your program.

‌ 17) What is MAC?


#
MAC stands for Mandatory Access Control, and Discretionary Access Control is abbreviated as DAC.
This is significant to protect the data and control the access.

‌ 18) What is crash recovery?


#
Database recovery is the process of restoring the database to a correct (consistent) state in the event
of a failure.

‌ 19) What is use of checkpoint?


#
to declare a point before which the DBMS was in the consistent state, and all transactions were
committed. During transaction execution, such checkpoints are traced.

‌ 20) Types of failure are?


#
network failure,
system crash,
natural disasters
Transaction errors, system errors, system crashes, concurrency problems and local errors or
exceptions are the more common causes of system failure

‌ 21)What is grant and revoke?


#
SQL Data Control Language commands and are used to enforce security in a multi-user database
environment

‌ 22)What is deadlock?
#
a situation in which two or more transactions are waiting for one another to give up locks.

‌ 23) What are concurrent schedules means.


#
A schedule is said to be concurrent in case the instructions of the transactions get executed
preemptively.
‌LONG QUESTION

‌ 1) Cascade less schedule.


@
in a schedule, a transaction is not allowed to read a data item until the last transaction that has written
it is committed or aborted, then such a schedule is called as a Cascadeless Schedule.

‌ 2) Recordable schedule.
@
If any transaction that performs a dirty read operation from an uncommitted transaction and also its
committed operation becomes delayed till the uncommitted transaction is either committed or
rollback such type of schedules is called as Recoverable Schedules.

‌ 3) Non recoverable schedule.


@
If a transaction does a dirty read operation from an uncommitted transaction and commits before the
transaction from where it has read the value, then such a schedule is called an irrecoverable schedule.

‌ 4)Explain role of DBA with respect to security.


@
The roles of a DBA include controlling access to the database, providing support services to the end
users, managing procedures for backup and recovery of the data, ensuring data integrity, controlling
data security and setting data privacy.

‌ 5)Differentiate between discretionary and mandatory access control method


@
Difference between DAC and MAC.
DACMACDAC stands for Discretionary Access Control.MAC stands for Mandatory Access
Control.DAC is easier to implement.MAC is difficult to implement.DAC is less secure to use.MAC is
more secure to use.

‌ 6) Explain client-server Architecture.


@
Server itself might be a client. For example, the server could request something from a database
server, which in this case, would make the server a client of the database server. Examples of
computer applications that use the client–server model are E ​ mail​, network printing​, and the ​World
Wide Web​.

‌ 7) Explain encryption techniques used for database security.


@
With database encryption, an encryption algorithm transforms data within a database from a readable
state into a ciphertext of unreadable characters.

‌ 8) Views Serializability
@
View serializability is a concept that is used to compute whether schedules are View-Serializable or
not.

‌ 9) Conflicts Serializability
@
Conflict Serializable: A schedule is called conflict serializable if it can be transformed into a serial
schedule by swapping non-conflicting operations.

You might also like