BIG-D Database System
BIG-D Database System
BIG-D Database System
Answer: d
Explanation: Even though multiple transactions may execute concurrently, the system
guarantees that, for every pair of transactions Ti and Tj, it appears to Ti that either Tj
finished execution before Ti started or Tj started execution after Ti finished.
1. The log is a sequence of _________ recording all the update activities in the
database.
a) Log records
b) Records
c) Entries
d) Redo
View Answer
Answer: a
Explanation: The most widely used structure for recording database modifications is the
log.
2. In the ___________ scheme, a transaction that wants to update the database first
creates a complete copy of the database.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned
View Answer
Answer: a
Explanation: If at any point the transaction has to be aborted, the system merely deletes
the new copy. The old copy of the database has not been affected.
3. The ____________ scheme uses a page table containing pointers to all pages; the
page table itself and all updated pages are copied to a new location.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned
View Answer
Answer: b
Explanation: Any page which is not updated by a transaction is not copied, but instead
the new page table just stores a pointer to the original page.
6. If database modifications occur while the transaction is still active, the transaction is
said to use the ___________technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
View Answer
Answer: c
Explanation: We say a transaction modifies the database if it performs an update on a
disk buffer, or on the disk itself; updates to the private part of main memory do not count
as database modifications.
7. ____________ using a log record sets the data item specified in the log record to the
old value.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
View Answer
Answer: d
Explanation: Undo brings the previous contents.
8. In the __________ phase, the system replays updates of all transactions by scanning
the log forward from the last checkpoint.
a) Repeating
b) Redo
c) Replay
d) Undo
View Answer
Answer: b
Explanation: Undo brings the previous contents.
9. The actions which are played in the order while recording it is called ______________
history.
a) Repeating
b) Redo
c) Replay
d) Undo
View Answer
Answer: a
Explanation: Undo brings the previous contents.
10. A special redo-only log record < Ti, Xj, V1> is written to the log, where V1 is the
value being restored to data item Xj during the rollback. These log records are
sometimes called
a) Log records
b) Records
c) Compensation log records
d) Compensation redo records
View Answer
Answer: c
Explanation: Such records do not need undo information since we never need to undo
such an undo operation.
1. The language used application programs to request data from the DBMS is referred to
as __________
a) DML
b) DDL
c) Query language
d) All of the Mentioned
View Answer
Answer: a
Explanation: Data Manipulation Language (DML) statements are used for managing
data in database. DML commands are not auto-committed. It means changes made by
DML command are not permanent to database, it can be rolled back.
2. In SQL, which of the following is not a data Manipulation Language Commands?
a) Delete
b) Truncate
c) Update
d) Create
View Answer
Answer: b
Explanation: The SQL TRUNCATE TABLE command is used to delete complete data
from an existing table.You can also use DROP TABLE command to delete complete
table but it would remove complete table structure form the database and you would
need to re-create this table once again if you wish you store some data.
3. Which of the following is not a type of SQL statement?
a) Data Manipulation Language (DML)
b) Data Definition Language (DDL)
c) Data Control Language (DCL)
d) Data Communication Language (DCL)
View Answer
Answer: d
Explanation: Data Communication Language (DCL) is not a type of SQL statement.
4. Which of the following is not included in DML (Data Manipulation Language)
a) INSERT
b) UPDATE
c) DELETE
d) CREATE
View Answer
Answer: d
Explanation: The CREATE TABLE statement is used to create a table in a
database.Tables are organized into rows and columns; and each table must have a
name.
5. TRUNCATE statement in SQL is a –
a) DML statement
b) DDL statement
c) DCL statement
d) TCL statement
View Answer
Answer: b
Explanation: The SQL TRUNCATE TABLE command is used to delete complete data
from an existing table.so its a DDL statement.
1. The log is a sequence of _________ recording all the update activities in the
database.
a) Log records
b) Records
c) Entries
d) Redo
View Answer
Answer: a
Explanation: The most widely used structure for recording database modifications is the
log.
2. In the ___________ scheme, a transaction that wants to update the database first
creates a complete copy of the database.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned
View Answer
Answer: a
Explanation: If at any point the transaction has to be aborted, the system merely deletes
the new copy. The old copy of the database has not been affected.
3. The ____________ scheme uses a page table containing pointers to all pages; the
page table itself and all updated pages are copied to a new location.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned
View Answer
Answer: b
Explanation: Any page which is not updated by a transaction is not copied, but instead
the new page table just stores a pointer to the original page.
Subscribe Now: DBMS Newsletter | Important Subjects Newsletters
advertisement