Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

751.

In crabbing protocol locking

A. goes down the tree and back up
B. goes up the tree and back down
C. goes down the tree and releases
D. goes up the tree and releases
Answer» B. goes up the tree and back down
752.

How many techniques are available to control concurrency on B+ trees?

A. one
B. three
C. four
D. none of the mentioned
Answer» E.
753.

Why do we need concurrency control on B+ trees ?

A. to remove the unwanted data
B. to easily add the index elements
C. to maintain accuracy of index
D. all of the mentioned
Answer» D. all of the mentioned
754.

The method of access that uses key transformation is called as

A. direct
B. hash
C. random
D. sequential
Answer» C. random
755.

Which statement is true regarding synonyms?

A. synonyms can be created for tables but not views
B. synonyms are used to reference only those tables that are owned by another user
C. a public synonym and a private synonym can exist with the same name for the same table
D. the drop synonym statement removes the synonym, and the status of the table on which the synonym has been created becomes invalid
Answer» D. the drop synonym statement removes the synonym, and the status of the table on which the synonym has been created becomes invalid
756.

A non-correlated subquery can be defined as

A. a set of sequential queries, all of which must always return a single value
B. a set of sequential queries, all of which must return values from the same table
C. a select statement that can be embedded in a clause of another select statement only
D. a set of one or more sequential queries in which generally the result of the inner query is used as the search value in the outer query
Answer» E.
757.

Which statements are correct regarding indexes?

A. when a table is dropped, the corresponding indexes are automatically dropped
B. for each dml operation performed, the corresponding indexes are automatically updated
C. a non-deferrable primary key or unique key constraint in a table automatically creates a unique index
D. all of the mentioned
Answer» E.
758.

Each of a pair of transactions has read data that is written by the other, but there is no data written by both transactions, is referred to as

A. read skew
B. update skew
C. write lock
D. none of the mentioned
Answer» E.
759.

Lost update problem is

A. second update overwrites the first
B. first update overwrites the second
C. the updates are lost due to conflicting problem
D. none of the mentioned
Answer» B. first update overwrites the second
760.

Snapshot isolation is used to give

A. transaction a snapshot of the database
B. database a snapshot of the transaction
C. database a snapshot of committed values in the transaction
D. transaction a snapshot of the database and database a snapshot of committed values in the transaction
Answer» E.
761.

DBMS periodically suspends all processing and synchronizes its files and journals through the use of

A. checkpoint facility
B. backup facility
C. recovery manager
D. database change log
Answer» B. backup facility
762.

The extent of the database resource that is included with each lock is called the level of

A. impact
B. granularity
C. management
D. dbms control
Answer» C. management
763.

A condition that occurs when two transactions wait for each other to unlock data is known as a(n)

A. shared lock
B. exclusive lock
C. binary lock
D. deadlock
Answer» E.
764.

ANSI-standard SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value is null is

A. between
B. is null
C. like
D. in
Answer» C. like
765.

The most recent version of standard SQL prescribed by the American National Standards Institute is

A. sql 2016
B. sql 2002
C. sql – 4
D. sql2
Answer» B. sql 2002
766.

A lock that prevents the use of any tables in the database from one transaction while another transaction is being processed is called a

A. database-level lock
B. table-level lock
C. page-level lock
D. row-level lock
Answer» B. table-level lock
767.

                         denotes the largest timestamp of any transaction that executed write(Q) successfully.

A. w-timestamp(q)
B. r-timestamp(q)
C. rw-timestamp(q)
D. wr-timestamp(q)
Answer» B. r-timestamp(q)
768.

The                      requires that each transaction Ti executes in two or three different phases in its lifetime, depending on whether it is a read-only or an update transaction.

A. validation protocol
B. validation-based protocol
C. timestamp protocol
D. timestamp-ordering protocol
Answer» B. validation-based protocol
769.

If a node is locked in                              the subtree rooted by that node is locked explicitly in shared mode, and that explicit locking is being done at a lower level with exclusive-mode locks.

A. intention lock modes
B. shared and intention-exclusive (six) mode
C. intention-exclusive (ix) mode
D. intention-shared (is) mode
Answer» C. intention-exclusive (ix) mode
770.

If a node is locked in                          then explicit locking is being done at a lower level, with exclusive-mode or shared-mode locks.

A. intention lock modes
B. intention-shared-exclusive mode
C. intention-exclusive (ix) mode
D. intention-shared (is) mode
Answer» D. intention-shared (is) mode
771.

If a node is locked in                      explicit locking is being done at a lower level of the tree, but with only shared-mode locks.

A. intention lock modes
B. intention-shared-exclusive mode
C. intention-exclusive (ix) mode
D. intention-shared (is) mode
Answer» B. intention-shared-exclusive mode
772.

If a node is locked in an intention mode, explicit locking is done at a lower level of the tree. This is called

A. intention lock modes
B. explicit lock
C. implicit lock
D. exclusive lock
Answer» B. explicit lock
773.

                     rollback requires the system to maintain additional information about the state of all the running transactions.

A. total
B. partial
C. time
D. commit
Answer» C. time
774.

A deadlock exists in the system if and only if the wait-for graph contains a

A. cycle
B. direction
C. bi-direction
D. rotation
Answer» B. direction
775.

The deadlock in a set of a transaction can be determined by

A. read-only graph
B. wait graph
C. wait-for graph
D. all of the mentioned
Answer» B. wait graph
776.

The situation where the lock waits only for a specified amount of time for another lock to be released is

A. lock timeout
B. wait-wound
C. timeout
D. wait
Answer» B. wait-wound
777.

When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a timestamp larger than that of Tj (that is, Ti is younger than Tj ). Otherwise, Tj is rolled back (Tj is wounded by Ti). This is

A. wait-die
B. wait-wound
C. wound-wait
D. wait
Answer» D. wait
778.

When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a timestamp smaller than that of Tj (that is, Ti is older than Tj). Otherwise, Ti is rolled back (dies). This is

A. wait-die
B. wait-wound
C. wound-wait
D. wait
Answer» B. wait-wound
779.

What are the ways of dealing with deadlock?

A. deadlock prevention
B. deadlock recovery
C. deadlock detection
D. all of the mentioned
Answer» E.
780.

The deadlock state can be changed back to stable state by using                             statement.

A. commit
B. rollback
C. savepoint
D. deadlock
Answer» C. savepoint
781.

A system is in a              state if there exists a set of transactions such that every transaction in the set is waiting for another transaction in the set.

A. idle
B. waiting
C. deadlock
D. ready
Answer» D. ready
782.

Which of the following is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released?

A. record controller
B. exclusive lock
C. authorization rule
D. two phase lock
Answer» E.
783.

The          lock allows concurrent transactions to access the same row as long as they require the use of different fields within that row.

A. table-level
B. page-level
C. row-level
D. field-level
Answer» E.
784.

Which of the following protocols ensures conflict serializability and safety from deadlocks?

A. two-phase locking protocol
B. time-stamp ordering protocol
C. graph based protocol
D. none of the mentioned
Answer» C. graph based protocol
785.

Which of the following are introduced to reduce the overheads caused by the log- based recovery?

A. checkpoints
B. indices
C. deadlocks
D. locks
Answer» B. indices
786.

Which refers to a property of computer to run several operation simultaneously and possible as computers await response of each other

A. concurrency
B. deadlock
C. backup
D. recovery
Answer» B. deadlock
787.

A lock that allows concurrent transactions to access different rows of the same table is known as a

A. database-level lock
B. table-level lock
C. page-level lock
D. row-level lock
Answer» E.
788.

Which of the following is the original purpose of SQL?

A. to specify the syntax and semantics of sql data definition language
B. to specify the syntax and semantics of sql manipulation language
C. to define the data structures
D. all of the mentioned
Answer» E.
789.

SQL can be used to:

A. create database structures only
B. query database data only
C. modify database data only
D. all of the mentioned
Answer» E.
790.

Which of the following statements is/are not true for SQL profiler?

A. enables you to monitor events
B. check if rows are being inserted properly
C. check the performance of a stored procedure
D. all of the mentioned
Answer» D. all of the mentioned
791.

Isolation of the transactions is ensured by

A. transaction management
B. application programmer
C. concurrency control
D. recovery management
Answer» D. recovery management
792.

Which statement is true regarding external tables?

A. the default reject limit for external tables is unlimited
B. the data and metadata for an external table are stored outside the database
C. oracle_loader and oracle_datapump have exactly the same functionality when used with an external table
D. the create table as select statement can be used to unload data into regular table in the database from an external table
Answer» E.
793.

SNAPSHOT is used for (DBA)

A. synonym
B. tablespace
C. system server
D. dynamic data replication
Answer» E.
794.

In which scenario would you use the ROLLUP operator for expression or columns within a GROUP BY clause?

A. to find the groups forming the subtotal in a row
B. to create group-wise grand totals for the groups specified within a group by clause
C. to create a grouping for expressions or columns specified within a group by clause in one direction, from right to left for calculating the subtotals
D. to create a grouping for expressions or columns specified within a group by clause in all possible directions, which is cross- tabular report for calculating the subtotals
Answer» D. to create a grouping for expressions or columns specified within a group by clause in all possible directions, which is cross- tabular report for calculating the subtotals
795.

A concurrency-control policy such as this one leads to              performance since it forces transactions to wait for preceding transactions to finish before they can start.

A. good
B. average
C. poor
D. unstable
Answer» D. unstable
796.

In concurrency control policy the lock is obtained on

A. entire database
B. a particular transaction alone
C. all the new elements
D. all of the mentioned
Answer» B. a particular transaction alone
797.

Which server can join the indexes when only multiple indexes combined can cover the query:

A. sql
B. dbms
C. rdbms
D. all of the mentioned
Answer» B. dbms
798.

                     are used to ensure that transactions access each data item in order of the transactions’          if their accesses conflict.

A. zone
B. relay
C. line
D. timestamps
Answer» E.
799.

Which are types of recovery control techniques:

A. deferred update
B. immediate update
C. all of the mentioned
D. none of the mentioned
Answer» D. none of the mentioned
800.

Copying files to secondary or specific devices is known as

A. retrieve
B. backup
C. recovery
D. deadlock
Answer» C. recovery