MCQOPTIONS
 Saved Bookmarks
				This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 751. | 
                                    In crabbing protocol locking | 
                            
| A. | goes down the tree and back up | 
| B. | goes up the tree and back down | 
| C. | goes down the tree and releases | 
| D. | goes up the tree and releases | 
| Answer» B. goes up the tree and back down | |
| 752. | 
                                    How many techniques are available to control concurrency on B+ trees? | 
                            
| A. | one | 
| B. | three | 
| C. | four | 
| D. | none of the mentioned | 
| Answer» E. | |
| 753. | 
                                    Why do we need concurrency control on B+ trees ? | 
                            
| A. | to remove the unwanted data | 
| B. | to easily add the index elements | 
| C. | to maintain accuracy of index | 
| D. | all of the mentioned | 
| Answer» D. all of the mentioned | |
| 754. | 
                                    The method of access that uses key transformation is called as | 
                            
| A. | direct | 
| B. | hash | 
| C. | random | 
| D. | sequential | 
| Answer» C. random | |
| 755. | 
                                    Which statement is true regarding synonyms? | 
                            
| A. | synonyms can be created for tables but not views | 
| B. | synonyms are used to reference only those tables that are owned by another user | 
| C. | a public synonym and a private synonym can exist with the same name for the same table | 
| D. | the drop synonym statement removes the synonym, and the status of the table on which the synonym has been created becomes invalid | 
| Answer» D. the drop synonym statement removes the synonym, and the status of the table on which the synonym has been created becomes invalid | |
| 756. | 
                                    A non-correlated subquery can be deï¬ned as | 
                            
| A. | a set of sequential queries, all of which must always return a single value | 
| B. | a set of sequential queries, all of which must return values from the same table | 
| C. | a select statement that can be embedded in a clause of another select statement only | 
| D. | a set of one or more sequential queries in which generally the result of the inner query is used as the search value in the outer query | 
| Answer» E. | |
| 757. | 
                                    Which statements are correct regarding indexes? | 
                            
| A. | when a table is dropped, the corresponding indexes are automatically dropped | 
| B. | for each dml operation performed, the corresponding indexes are automatically updated | 
| C. | a non-deferrable primary key or unique key constraint in a table automatically creates a unique index | 
| D. | all of the mentioned | 
| Answer» E. | |
| 758. | 
                                    Each of a pair of transactions has read data that is written by the other, but there is no data written by both transactions, is referred to as | 
                            
| A. | read skew | 
| B. | update skew | 
| C. | write lock | 
| D. | none of the mentioned | 
| Answer» E. | |
| 759. | 
                                    Lost update problem is | 
                            
| A. | second update overwrites the ï¬rst | 
| B. | first update overwrites the second | 
| C. | the updates are lost due to conflicting problem | 
| D. | none of the mentioned | 
| Answer» B. first update overwrites the second | |
| 760. | 
                                    Snapshot isolation is used to give | 
                            
| A. | transaction a snapshot of the database | 
| B. | database a snapshot of the transaction | 
| C. | database a snapshot of committed values in the transaction | 
| D. | transaction a snapshot of the database and database a snapshot of committed values in the transaction | 
| Answer» E. | |
| 761. | 
                                    DBMS periodically suspends all processing and synchronizes its ï¬les and journals through the use of | 
                            
| A. | checkpoint facility | 
| B. | backup facility | 
| C. | recovery manager | 
| D. | database change log | 
| Answer» B. backup facility | |
| 762. | 
                                    The extent of the database resource that is included with each lock is called the level of | 
                            
| A. | impact | 
| B. | granularity | 
| C. | management | 
| D. | dbms control | 
| Answer» C. management | |
| 763. | 
                                    A condition that occurs when two transactions wait for each other to unlock data is known as a(n) | 
                            
| A. | shared lock | 
| B. | exclusive lock | 
| C. | binary lock | 
| D. | deadlock | 
| Answer» E. | |
| 764. | 
                                    ANSI-standard SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value is null is | 
                            
| A. | between | 
| B. | is null | 
| C. | like | 
| D. | in | 
| Answer» C. like | |
| 765. | 
                                    The most recent version of standard SQL prescribed by the American National Standards Institute is | 
                            
| A. | sql 2016 | 
| B. | sql 2002 | 
| C. | sql – 4 | 
| D. | sql2 | 
| Answer» B. sql 2002 | |
| 766. | 
                                    A lock that prevents the use of any tables in the database from one transaction while another transaction is being processed is called a | 
                            
| A. | database-level lock | 
| B. | table-level lock | 
| C. | page-level lock | 
| D. | row-level lock | 
| Answer» B. table-level lock | |
| 767. | 
                                    Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â denotes the largest timestamp of any transaction that executed write(Q) successfully. | 
                            
| A. | w-timestamp(q) | 
| B. | r-timestamp(q) | 
| C. | rw-timestamp(q) | 
| D. | wr-timestamp(q) | 
| Answer» B. r-timestamp(q) | |
| 768. | 
                                    The                      requires that each transaction Ti executes in two or three different phases in its lifetime, depending on whether it is a read-only or an update transaction. | 
                            
| A. | validation protocol | 
| B. | validation-based protocol | 
| C. | timestamp protocol | 
| D. | timestamp-ordering protocol | 
| Answer» B. validation-based protocol | |
| 769. | 
                                    If a node is locked in                              the subtree rooted by that node is locked explicitly in shared mode, and that explicit locking is being done at a lower level with exclusive-mode locks. | 
                            
| A. | intention lock modes | 
| B. | shared and intention-exclusive (six) mode | 
| C. | intention-exclusive (ix) mode | 
| D. | intention-shared (is) mode | 
| Answer» C. intention-exclusive (ix) mode | |
| 770. | 
                                    If a node is locked in                          then explicit locking is being done at a lower level, with exclusive-mode or shared-mode locks. | 
                            
| A. | intention lock modes | 
| B. | intention-shared-exclusive mode | 
| C. | intention-exclusive (ix) mode | 
| D. | intention-shared (is) mode | 
| Answer» D. intention-shared (is) mode | |
| 771. | 
                                    If a node is locked in                      explicit locking is being done at a lower level of the tree, but with only shared-mode locks. | 
                            
| A. | intention lock modes | 
| B. | intention-shared-exclusive mode | 
| C. | intention-exclusive (ix) mode | 
| D. | intention-shared (is) mode | 
| Answer» B. intention-shared-exclusive mode | |
| 772. | 
                                    If a node is locked in an intention mode, explicit locking is done at a lower level of the tree. This is called | 
                            
| A. | intention lock modes | 
| B. | explicit lock | 
| C. | implicit lock | 
| D. | exclusive lock | 
| Answer» B. explicit lock | |
| 773. | 
                                    Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â rollback requires the system to maintain additional information about the state of all the running transactions. | 
                            
| A. | total | 
| B. | partial | 
| C. | time | 
| D. | commit | 
| Answer» C. time | |
| 774. | 
                                    A deadlock exists in the system if and only if the wait-for graph contains a | 
                            
| A. | cycle | 
| B. | direction | 
| C. | bi-direction | 
| D. | rotation | 
| Answer» B. direction | |
| 775. | 
                                    The deadlock in a set of a transaction can be determined by | 
                            
| A. | read-only graph | 
| B. | wait graph | 
| C. | wait-for graph | 
| D. | all of the mentioned | 
| Answer» B. wait graph | |
| 776. | 
                                    The situation where the lock waits only for a speciï¬ed amount of time for another lock to be released is | 
                            
| A. | lock timeout | 
| B. | wait-wound | 
| C. | timeout | 
| D. | wait | 
| Answer» B. wait-wound | |
| 777. | 
                                    When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a timestamp larger than that of Tj (that is, Ti is younger than Tj ). Otherwise, Tj is rolled back (Tj is wounded by Ti). This is | 
                            
| A. | wait-die | 
| B. | wait-wound | 
| C. | wound-wait | 
| D. | wait | 
| Answer» D. wait | |
| 778. | 
                                    When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a timestamp smaller than that of Tj (that is, Ti is older than Tj). Otherwise, Ti is rolled back (dies). This is | 
                            
| A. | wait-die | 
| B. | wait-wound | 
| C. | wound-wait | 
| D. | wait | 
| Answer» B. wait-wound | |
| 779. | 
                                    What are the ways of dealing with deadlock? | 
                            
| A. | deadlock prevention | 
| B. | deadlock recovery | 
| C. | deadlock detection | 
| D. | all of the mentioned | 
| Answer» E. | |
| 780. | 
                                    The deadlock state can be changed back to stable state by using                            statement. | 
                            
| A. | commit | 
| B. | rollback | 
| C. | savepoint | 
| D. | deadlock | 
| Answer» C. savepoint | |
| 781. | 
                                    A system is in a              state if there exists a set of transactions such that every transaction in the set is waiting for another transaction in the set. | 
                            
| A. | idle | 
| B. | waiting | 
| C. | deadlock | 
| D. | ready | 
| Answer» D. ready | |
| 782. | 
                                    Which of the following is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released? | 
                            
| A. | record controller | 
| B. | exclusive lock | 
| C. | authorization rule | 
| D. | two phase lock | 
| Answer» E. | |
| 783. | 
                                    The          lock allows concurrent transactions to access the same row as long as they require the use of different ï¬elds within that row. | 
                            
| A. | table-level | 
| B. | page-level | 
| C. | row-level | 
| D. | field-level | 
| Answer» E. | |
| 784. | 
                                    Which of the following protocols ensures conflict serializability and safety from deadlocks? | 
                            
| A. | two-phase locking protocol | 
| B. | time-stamp ordering protocol | 
| C. | graph based protocol | 
| D. | none of the mentioned | 
| Answer» C. graph based protocol | |
| 785. | 
                                    Which of the following are introduced to reduce the overheads caused by the log- based recovery? | 
                            
| A. | checkpoints | 
| B. | indices | 
| C. | deadlocks | 
| D. | locks | 
| Answer» B. indices | |
| 786. | 
                                    Which refers to a property of computer to run several operation simultaneously and possible as computers await response of each other | 
                            
| A. | concurrency | 
| B. | deadlock | 
| C. | backup | 
| D. | recovery | 
| Answer» B. deadlock | |
| 787. | 
                                    A lock that allows concurrent transactions to access different rows of the same table is known as a | 
                            
| A. | database-level lock | 
| B. | table-level lock | 
| C. | page-level lock | 
| D. | row-level lock | 
| Answer» E. | |
| 788. | 
                                    Which of the following is the original purpose of SQL? | 
                            
| A. | to specify the syntax and semantics of sql data deï¬nition language | 
| B. | to specify the syntax and semantics of sql manipulation language | 
| C. | to deï¬ne the data structures | 
| D. | all of the mentioned | 
| Answer» E. | |
| 789. | 
                                    SQL can be used to: | 
                            
| A. | create database structures only | 
| B. | query database data only | 
| C. | modify database data only | 
| D. | all of the mentioned | 
| Answer» E. | |
| 790. | 
                                    Which of the following statements is/are not true for SQL proï¬ler? | 
                            
| A. | enables you to monitor events | 
| B. | check if rows are being inserted properly | 
| C. | check the performance of a stored procedure | 
| D. | all of the mentioned | 
| Answer» D. all of the mentioned | |
| 791. | 
                                    Isolation of the transactions is ensured by | 
                            
| A. | transaction management | 
| B. | application programmer | 
| C. | concurrency control | 
| D. | recovery management | 
| Answer» D. recovery management | |
| 792. | 
                                    Which statement is true regarding external tables? | 
                            
| A. | the default reject limit for external tables is unlimited | 
| B. | the data and metadata for an external table are stored outside the database | 
| C. | oracle_loader and oracle_datapump have exactly the same functionality when used with an external table | 
| D. | the create table as select statement can be used to unload data into regular table in the database from an external table | 
| Answer» E. | |
| 793. | 
                                    SNAPSHOT is used for (DBA) | 
                            
| A. | synonym | 
| B. | tablespace | 
| C. | system server | 
| D. | dynamic data replication | 
| Answer» E. | |
| 794. | 
                                    In which scenario would you use the ROLLUP operator for expression or columns within a GROUP BY clause? | 
                            
| A. | to ï¬nd the groups forming the subtotal in a row | 
| B. | to create group-wise grand totals for the groups speciï¬ed within a group by clause | 
| C. | to create a grouping for expressions or columns speciï¬ed within a group by clause in one direction, from right to left for calculating the subtotals | 
| D. | to create a grouping for expressions or columns speciï¬ed within a group by clause in all possible directions, which is cross- tabular report for calculating the subtotals | 
| Answer» D. to create a grouping for expressions or columns speciï¬ed within a group by clause in all possible directions, which is cross- tabular report for calculating the subtotals | |
| 795. | 
                                    A concurrency-control policy such as this one leads to              performance since it forces transactions to wait for preceding transactions to ï¬nish before they can start. | 
                            
| A. | good | 
| B. | average | 
| C. | poor | 
| D. | unstable | 
| Answer» D. unstable | |
| 796. | 
                                    In concurrency control policy the lock is obtained on | 
                            
| A. | entire database | 
| B. | a particular transaction alone | 
| C. | all the new elements | 
| D. | all of the mentioned | 
| Answer» B. a particular transaction alone | |
| 797. | 
                                    Which server can join the indexes when only multiple indexes combined can cover the query: | 
                            
| A. | sql | 
| B. | dbms | 
| C. | rdbms | 
| D. | all of the mentioned | 
| Answer» B. dbms | |
| 798. | 
                                                         are used to ensure that transactions access each data item in order of the transactions’          if their accesses conflict. | 
                            
| A. | zone | 
| B. | relay | 
| C. | line | 
| D. | timestamps | 
| Answer» E. | |
| 799. | 
                                    Which are types of recovery control techniques: | 
                            
| A. | deferred update | 
| B. | immediate update | 
| C. | all of the mentioned | 
| D. | none of the mentioned | 
| Answer» D. none of the mentioned | |
| 800. | 
                                    Copying ï¬les to secondary or speciï¬c devices is known as | 
                            
| A. | retrieve | 
| B. | backup | 
| C. | recovery | 
| D. | deadlock | 
| Answer» C. recovery | |