0% found this document useful (0 votes)
18 views1 page

UINT V Questions

The document outlines various topics related to database transactions, including types of failures, ACID properties, locking mechanisms, deadlock prevention protocols, and recovery techniques. It also covers indexing methods and data structures like B-trees in file organization. Each section provides insights into the complexities and methodologies of managing transactions and data efficiently.

Uploaded by

Shanthi.V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views1 page

UINT V Questions

The document outlines various topics related to database transactions, including types of failures, ACID properties, locking mechanisms, deadlock prevention protocols, and recovery techniques. It also covers indexing methods and data structures like B-trees in file organization. Each section provides insights into the complexities and methodologies of managing transactions and data efficiently.

Uploaded by

Shanthi.V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

1. Discuss the different types of failures. What is meant by Catastrophic failure?

2. Draw a state diagram, and discuss the typical states that a transaction goes through
during execution
3. List and discuss the ACID properties of a database transaction
4. Compare binary locks to exclusive/shared locks. Why is the latter type of locks
preferable?
5. Discuss the problems of deadlock and starvation, and the different approaches to
dealing with these problems
6. Describe the wait-die and wound-wait protocols for deadlock prevention
7. What are before image (BFIM) and after image (AFIM) of a data item? What is the
difference between in-place updating and shadowing, with respect to their handling of
BFIM and AFIM?
8. Discuss the deferred update technique of recovery. What are its advantages and
disadvantages? Why is it called the NO-UNDO/REDO method?
9. Discuss the immediate update technique of recovery in both single-user and multi-
user environments. What are its advantages and disadvantages?
10. Differentiate static and dynamic hashing techniques
11. Define index files and index attribute in file organization. Explain different types of
indexes
12. Explain multilevel indexes and index on multiple keys
13. Discuss primary, secondary and clustering index in file organization
14. Write note on B-trees data structure in file organization

You might also like