MCQOPTIONS
Saved Bookmarks
This section includes 36 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
In optimistic locking, the assumption is made that conflict will occur.%! |
| A. | True |
| B. | False |
| Answer» C. | |
| 2. |
An ACID transaction is one that is atomic, consistent isolated, and durable.%! |
| A. | True |
| B. | False |
| Answer» B. False | |
| 3. |
An exclusive lock locks the item from change but not from read.%! |
| A. | True |
| B. | False |
| Answer» C. | |
| 4. |
Locks placed by command are implicit locks.%! |
| A. | True |
| B. | False |
| Answer» C. | |
| 5. |
Locks placed by the DBMS are explicit locks.%! |
| A. | True |
| B. | False |
| Answer» C. | |
| 6. |
A durable transaction is one in which all committed changes are permanent.%! |
| A. | True |
| B. | False |
| Answer» B. False | |
| 7. |
A point of synchronization between the database and the transaction log is generally referred to as a stop point.%! |
| A. | True |
| B. | False |
| Answer» C. | |
| 8. |
Database administration refers to a function that applies to the entire organization.%! |
| A. | True |
| B. | False |
| Answer» C. | |
| 9. |
When two transactions are being processed against the database at the same time they are termed concurrent transactions.%! |
| A. | True |
| B. | False |
| Answer» B. False | |
| 10. |
The size of the lock is referred to as the lock granularity.%! |
| A. | True |
| B. | False |
| Answer» B. False | |
| 11. |
A transaction is a series of actions to be taken on the database so that either all of them are performed successfully or none of them are performed at all.%! |
| A. | True |
| B. | False |
| Answer» B. False | |
| 12. |
The transaction log contains a copy of every database record (or page) after it has changed. These records are called before images.%! |
| A. | True |
| B. | False |
| Answer» C. | |
| 13. |
The size of a lock is referred to as lock sizing.%! |
| A. | True |
| B. | False |
| Answer» C. | |
| 14. |
The overall responsibility of the DBA is to facilitate the development and use of the database.%! |
| A. | True |
| B. | False |
| Answer» B. False | |
| 15. |
A phantom read occurs when a transaction rereads data it has previously read and finds modifications or deletions caused by a committed transaction.%! |
| A. | True |
| B. | False |
| Answer» C. | |
| 16. |
The lost update problem is when User A reads data that have been processed by a portion of a transaction from User B.%! |
| A. | True |
| B. | False |
| Answer» C. | |
| 17. |
When one transaction reads a changed record that has not been committed to the database a filthy read occurs.%! |
| A. | True |
| B. | False |
| Answer» C. | |
| 18. |
Resource locking is a process to prevent multiple applications from obtaining copies of the same record when the record is about to be changed.%! |
| A. | True |
| B. | False |
| Answer» B. False | |
| 19. |
The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times.%! |
| A. | True |
| B. | False |
| Answer» B. False | |
| 20. |
Two transactions that run concurrently and generate results that are consistent with the results that would have occurred if they had run separately are referred to as serializable transactions.%! |
| A. | True |
| B. | False |
| Answer» B. False | |
| 21. |
In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed.%! |
| A. | Read committed |
| B. | Read uncommitted |
| C. | Repeatable read |
| D. | Serializable |
| Answer» B. Read uncommitted | |
| 22. |
*$_In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed.? |
| A. | Read committed |
| B. | Read uncommitted |
| C. | Repeatable read |
| D. | Serializable |
| Answer» B. Read uncommitted | |
| 23. |
*/*_Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads?? |
| A. | Read committed |
| B. | Read uncommitted |
| C. | Repeatable read |
| D. | Serializable |
| Answer» D. Serializable | |
| 24. |
*/*_Locks placed by the DBMS are called ________ .? |
| A. | implicit locks |
| B. | explicit locks |
| C. | exclusive locks |
| D. | shared locks |
| Answer» B. explicit locks | |
| 25. |
*/*_Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?? |
| A. | Read committed |
| B. | Read uncommitted |
| C. | Repeatable read |
| D. | Serializable |
| Answer» C. Repeatable read | |
| 26. |
*/*_A transaction for which all committed changes are permanent is called:? |
| A. | atomic. |
| B. | consistent. |
| C. | isolated. |
| D. | durable. |
| Answer» E. | |
| 27. |
_ A transaction for which all committed changes are permanent is called:$? |
| A. | atomic. |
| B. | consistent. |
| C. | isolated. |
| D. | durable. |
| Answer» E. | |
| 28. |
_ Which of the following refers to a cursor type where changes of any type and from any source are visible?$? |
| A. | Forward only |
| B. | Static |
| C. | Keyset |
| D. | Dynamic |
| Answer» E. | |
| 29. |
_ What is the overall responsibility of the DBA?$? |
| A. | Facilitate the development and use of the database |
| B. | Create and populate tables |
| C. | Development, operation, and maintenance of the database and its applications |
| D. | Both the first and third answers above are correct. |
| Answer» E. | |
| 30. |
_ Which of the following occurs when one transaction reads a changed record that has not been committed to the database?$? |
| A. | Nonrepeatable read |
| B. | Phantom read |
| C. | Dirty read |
| D. | Consistent read |
| Answer» D. Consistent read | |
| 31. |
_Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?$? |
| A. | Nonrepeatable read |
| B. | Phantom read |
| C. | Dirty read |
| D. | Consistent read |
| Answer» C. Dirty read | |
| 32. |
_Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?$? |
| A. | Forward only |
| B. | Static |
| C. | Keyset |
| D. | Dynamic |
| Answer» D. Dynamic | |
| 33. |
_A cursor type in which the application sees the data as they were at the time the cursor was opened is called:$? |
| A. | forward only |
| B. | static |
| C. | keyset |
| D. | dynamic |
| Answer» C. keyset | |
| 34. |
_A cursor type in which the application can only move forward through the recordset is called:$? |
| A. | forward only. |
| B. | static. |
| C. | keyset. |
| D. | dynamic. |
| Answer» B. static. | |
| 35. |
Which of the following locks the item from change but not from read?$? |
| A. | Implicit lock |
| B. | Explicit lock |
| C. | Exclusive lock |
| D. | Shared lock |
| Answer» E. | |
| 36. |
Which of the following locks the item from change but not from read?? |
| A. | Implicit lock |
| B. | Explicit lock |
| C. | Exclusive lock |
| D. | Shared lock |
| Answer» E. | |