Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

In timestamp ordering protocol, suppose that the transaction Ti issues read(Q) and TS(Ti)

A. Read operation is executed
B. Read operation is rejected
C. Write operation is executed
D. Write operation is rejected
Answer» C. Write operation is executed
2.

In timestamp ordering protocol, suppose that the transaction Ti issues write(Q) and TS(Ti)

A. Read operation is executed
B. Read operation is rejected
C. Write operation is executed
D. Write operation is rejected
Answer» E.
3.

The type of constraints that specifies the uniqueness of data stored in the database are considered as

A. Semantics
B. Business rules
C. Controlled rules
D. Structural rules
Answer» B. Business rules
4.

The property of DBMS which ensures the execution of all the operations in transaction or none of the operation is executed is classified as

A. Isolation property
B. Atomicity property
C. Online execution property
D. Offline execution property
Answer» C. Online execution property
5.

The control feature in database management system which ensures the accuracy of data updated by multiple users is classified as

A. Conceptual implementation control
B. Concurrency control
C. Interface modeling control
D. User accessibility control
Answer» C. Interface modeling control
6.

The property of DBMS which ensures whether the hundreds of applications are executed, each transaction must be executed in isolation is classified as

A. Online execution property
B. Offline execution property
C. Isolation property
D. Atomicity property
Answer» D. Atomicity property
7.

In crabbing protocol the the lock obtained on the root node is in _________ mode.

A. Shared
B. Exclusive
C. Read only
D. None of the mentioned
Answer» B. Exclusive
8.

Instead of locking index leaf nodes in a two-phase manner, some index concurrency-control schemes use ___________ on individual key values, allowing other key values to be inserted or deleted from the same leaf.

A. B+ tree locking
B. Link level locking
C. Key-value locking
D. Next value locking
Answer» D. Next value locking
9.

The extent of the database resource that is included with each lock is called the level of

A. Impact
B. Granularity
C. Management
D. DBMS control
Answer» C. Management
10.

Evaluate the CREATE TABLE statement:CREATE TABLE products(product_id NUMBER(6) CONSTRAINT prod_id_pk PRIMARY KEY, product_name VARCHAR2(15));Which statement is true regarding the PROD_ID_PK constraint?

A. It would be created only if a unique index is manually created first
B. It would be created and would use an automatically created unique index
C. It would be created and would use an automatically created no unique index
D. It would be created and remains in a disabled state because no index is specified in the command
Answer» C. It would be created and would use an automatically created no unique index
11.

Evaluate the following CREATE SEQUENCE statement:CREATE SEQUENCE seq1START WITH 100INCREMENT BY 10MAXVALUE 200CYCLENOCACHE;The sequence SEQ1 has generated numbers up to the maximum limit of 200. You issue the following SQL statement:SELECT seq1.nextval FROM dual;What is displayed by the SELECT statement?

A. 1
B. 10
C. 100
D. An error
Answer» B. 10
12.

The method of access that uses key transformation is called as

A. Direct
B. Hash
C. Random
D. Sequential
Answer» C. Random
13.

Which one of the following is a failure to system

A. Boot crash
B. Read failure
C. Transaction failure
D. All of the mentioned
Answer» D. All of the mentioned
14.

Which kind of failure loses its data in head crash or failure during transfer operation.

A. Transaction failure
B. System crash
C. Disk failure
D. All of the mentioned
Answer» D. All of the mentioned
15.

This validation scheme is called the _________ scheme since transactions execute optimistically, assuming they will be able to finish execution and validate at the end.

A. Validation protocol
B. Validation-based protocol
C. Timestamp protocol
D. Optimistic concurrency-control
Answer» B. Validation-based protocol
16.

If transaction Ti gets an explicit lock on the file Fc in exclusive mode, then it has an__________ on all the records belonging to that file.

A. Explicit lock in exclusive mode
B. Implicit lock in shared mode
C. Explicit lock in shared mode
D. Implicit lock in exclusive mode
Answer» E.
17.

Which of the following is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released?

A. Record controller
B. Exclusive lock
C. Authorization rule
D. Two phase lock
Answer» E.
Previous Next