MCQOPTIONS
Saved Bookmarks
This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
In timestamp ordering protocol, suppose that the transaction Ti issues read(Q) and TS(Ti) |
| A. | Read operation is executed |
| B. | Read operation is rejected |
| C. | Write operation is executed |
| D. | Write operation is rejected |
| Answer» C. Write operation is executed | |
| 2. |
In timestamp ordering protocol, suppose that the transaction Ti issues write(Q) and TS(Ti) |
| A. | Read operation is executed |
| B. | Read operation is rejected |
| C. | Write operation is executed |
| D. | Write operation is rejected |
| Answer» E. | |
| 3. |
The type of constraints that specifies the uniqueness of data stored in the database are considered as |
| A. | Semantics |
| B. | Business rules |
| C. | Controlled rules |
| D. | Structural rules |
| Answer» B. Business rules | |
| 4. |
The property of DBMS which ensures the execution of all the operations in transaction or none of the operation is executed is classified as |
| A. | Isolation property |
| B. | Atomicity property |
| C. | Online execution property |
| D. | Offline execution property |
| Answer» C. Online execution property | |
| 5. |
The control feature in database management system which ensures the accuracy of data updated by multiple users is classified as |
| A. | Conceptual implementation control |
| B. | Concurrency control |
| C. | Interface modeling control |
| D. | User accessibility control |
| Answer» C. Interface modeling control | |
| 6. |
The property of DBMS which ensures whether the hundreds of applications are executed, each transaction must be executed in isolation is classified as |
| A. | Online execution property |
| B. | Offline execution property |
| C. | Isolation property |
| D. | Atomicity property |
| Answer» D. Atomicity property | |
| 7. |
In crabbing protocol the the lock obtained on the root node is in _________ mode. |
| A. | Shared |
| B. | Exclusive |
| C. | Read only |
| D. | None of the mentioned |
| Answer» B. Exclusive | |
| 8. |
Instead of locking index leaf nodes in a two-phase manner, some index concurrency-control schemes use ___________ on individual key values, allowing other key values to be inserted or deleted from the same leaf. |
| A. | B+ tree locking |
| B. | Link level locking |
| C. | Key-value locking |
| D. | Next value locking |
| Answer» D. Next value locking | |
| 9. |
The extent of the database resource that is included with each lock is called the level of |
| A. | Impact |
| B. | Granularity |
| C. | Management |
| D. | DBMS control |
| Answer» C. Management | |
| 10. |
Evaluate the CREATE TABLE statement:CREATE TABLE products(product_id NUMBER(6) CONSTRAINT prod_id_pk PRIMARY KEY, product_name VARCHAR2(15));Which statement is true regarding the PROD_ID_PK constraint? |
| A. | It would be created only if a unique index is manually created first |
| B. | It would be created and would use an automatically created unique index |
| C. | It would be created and would use an automatically created no unique index |
| D. | It would be created and remains in a disabled state because no index is specified in the command |
| Answer» C. It would be created and would use an automatically created no unique index | |
| 11. |
Evaluate the following CREATE SEQUENCE statement:CREATE SEQUENCE seq1START WITH 100INCREMENT BY 10MAXVALUE 200CYCLENOCACHE;The sequence SEQ1 has generated numbers up to the maximum limit of 200. You issue the following SQL statement:SELECT seq1.nextval FROM dual;What is displayed by the SELECT statement? |
| A. | 1 |
| B. | 10 |
| C. | 100 |
| D. | An error |
| Answer» B. 10 | |
| 12. |
The method of access that uses key transformation is called as |
| A. | Direct |
| B. | Hash |
| C. | Random |
| D. | Sequential |
| Answer» C. Random | |
| 13. |
Which one of the following is a failure to system |
| A. | Boot crash |
| B. | Read failure |
| C. | Transaction failure |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 14. |
Which kind of failure loses its data in head crash or failure during transfer operation. |
| A. | Transaction failure |
| B. | System crash |
| C. | Disk failure |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 15. |
This validation scheme is called the _________ scheme since transactions execute optimistically, assuming they will be able to finish execution and validate at the end. |
| A. | Validation protocol |
| B. | Validation-based protocol |
| C. | Timestamp protocol |
| D. | Optimistic concurrency-control |
| Answer» B. Validation-based protocol | |
| 16. |
If transaction Ti gets an explicit lock on the file Fc in exclusive mode, then it has an__________ on all the records belonging to that file. |
| A. | Explicit lock in exclusive mode |
| B. | Implicit lock in shared mode |
| C. | Explicit lock in shared mode |
| D. | Implicit lock in exclusive mode |
| Answer» E. | |
| 17. |
Which of the following is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released? |
| A. | Record controller |
| B. | Exclusive lock |
| C. | Authorization rule |
| D. | Two phase lock |
| Answer» E. | |