 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
| 1. | THE______LOCK_ALLOWS_CONCURRENT_TRANSACTIONS_TO_ACCESS_THE_SAME_ROW_AS_LONG_AS_THEY_REQUIRE_THE_USE_OF_DIFFERENT_FIELDS_WITHIN_THAT_ROW.?$ | 
| A. | Table-level | 
| B. | Page-level | 
| C. | Row-level | 
| D. | Field-level | 
| Answer» E. | |
| 2. | Which_of_the_following_is_a_procedure_for_acquiring_the_necessary_locks_for_a_transaction_where_all_necessary_locks_are_acquired_before_any_are_released?$ | 
| A. | Record controller | 
| B. | Exclusive lock | 
| C. | Authorization rule | 
| D. | Two phase lock | 
| Answer» E. | |
| 3. | All lock information is managed by a __________ which is responsible for assigning and policing the locks used by the transactions? | 
| A. | Scheduler | 
| B. | DBMS | 
| C. | Lock manager | 
| D. | Locking agent | 
| Answer» D. Locking agent | |
| 4. | Which refers to a property of computer to run several operation simultaneously and possible as computers await response of each other | 
| A. | Concurrency | 
| B. | Deadlock | 
| C. | Backup | 
| D. | Recovery | 
| Answer» B. Deadlock | |
| 5. | If transaction Ti gets an explicit lock on the file Fc in exclusive mode, then it has an ­­­­­­__________ on all the records belonging to that file.$ | 
| A. | Explicit lock in exclusive mode | 
| B. | Implicit lock in shared mode | 
| C. | Explicit lock in shared mode | 
| D. | Implicit lock in exclusive mode | 
| Answer» E. | |
| 6. | Which of the following is the block that is not permitted to be written back to the disk? | 
| A. | Dead code | 
| B. | Read only | 
| C. | Pinned | 
| D. | Zapped | 
| Answer» D. Zapped | |
| 7. | Which of the following protocols ensures conflict serializability and safety from deadlocks? | 
| A. | Two-phase locking protocol | 
| B. | Time-stamp ordering protocol | 
| C. | Graph based protocol | 
| D. | None of the mentioned | 
| Answer» C. Graph based protocol | |
| 8. | Which of the following are introduced to reduce the overheads caused by the log-based recovery? | 
| A. | Checkpoints | 
| B. | Indices | 
| C. | Deadlocks | 
| D. | Locks | 
| Answer» B. Indices | |
| 9. | A lock that allows concurrent transactions to access different rows of the same table is known as a | 
| A. | Database-level lock | 
| B. | Table-level lock | 
| C. | Page-level lock | 
| D. | Row-level lock | 
| Answer» E. | |
| 10. | In order to maintain transactional integrity and database consistency, what technology does a DBMS deploy? | 
| A. | Triggers | 
| B. | Pointers | 
| C. | Locks | 
| D. | Cursors | 
| Answer» D. Cursors | |