UINT V Questions
UINT V Questions
2. Draw a state diagram, and discuss the typical states that a transaction goes through
during execution
3. List and discuss the ACID properties of a database transaction
4. Compare binary locks to exclusive/shared locks. Why is the latter type of locks
preferable?
5. Discuss the problems of deadlock and starvation, and the different approaches to
dealing with these problems
6. Describe the wait-die and wound-wait protocols for deadlock prevention
7. What are before image (BFIM) and after image (AFIM) of a data item? What is the
difference between in-place updating and shadowing, with respect to their handling of
BFIM and AFIM?
8. Discuss the deferred update technique of recovery. What are its advantages and
disadvantages? Why is it called the NO-UNDO/REDO method?
9. Discuss the immediate update technique of recovery in both single-user and multi-
user environments. What are its advantages and disadvantages?
10. Differentiate static and dynamic hashing techniques
11. Define index files and index attribute in file organization. Explain different types of
indexes
12. Explain multilevel indexes and index on multiple keys
13. Discuss primary, secondary and clustering index in file organization
14. Write note on B-trees data structure in file organization