143 Quastion
143 Quastion
a. Ensuring that transactions are free from interference from other users.
a. Lost Update
b. Uncommitted Dependency
c. Inconsistent Data
4. A lock that allows concurrent transactions to access different rows of the same table is known as a
a. Field-level lock
b. Row-level lock
c. Table-level lock
d. Database-level lock
a. Saved
b. Loaded
c. Rolled
d. Committed
6. A system is in a ______ state if there exists a set of transactions such that every transaction in the set
is waiting for another transaction in the set.
a. Idle
b. Waiting
c. Deadlock
d. Ready
7. The deadlock state can be changed back to stable state by using _____________ statement.
a. Commit
b. Rollback
c. Savepoint
d. Deadlock
a. Deadlock prevention
b. Deadlock recovery
c. Deadlock detection
9. When transaction Ti requests a data item currently held by Tj , Ti is allowed to wait only if it has a
timestamp smaller than that of Tj (that is, Ti is older than Tj ). Otherwise, Ti is rolled back (dies). This is
a. Wait-die
b. Wait-wound
c. Wound-wait
d. Wait
10. When transaction Ti requests a data item currently held by Tj , Ti is allowed to wait only if it has a
timestamp larger than that of Tj (that is, Ti is younger than Tj ). Otherwise, Tj is rolled back (Tj is
wounded by Ti ). This is
a. Wait-die
b. Wait-wound
c. Wound-wait
d. Wait
a. Read-only graph
b. Wait graph
c. Wait-for graph
12. A deadlock exists in the system if and only if the wait-for graph contains a ___________.
a. Cycle
b. Direction
c. Bi-direction
d. Rotation
13. Selecting the victim to be rollbacked to the previous state is determined by the minimum cost. The
factors determining cost of rollback is
a. How long the transaction has computed, and how much longer the transaction will compute before it
completes its designated task.
c. How many more data items the transaction needs for it to complete and how many transactions will
be involved in the rollback.
14. __________ rollback requires the system to maintain additional information about the state of all
the running transactions.
a. Total
b. Partial
c. Time
d. Commit
b. ABCDEFG
c. 0x99fffa
d. 99671246
16. Which of the following occurs when a transaction rereads data and finds new rows that were
inserted by a command transaction since the prior read?
a. Nonrepeatable read
b. Phantom read
c. Dirty read
d. Consistent read
17. A transaction for which all committed changes are permanent is called:
a. atomic
b. consistent
c. isolated
d. durable
18. In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are
allowed.
a. Read committed
b. Read uncommitted
c. Repeatable read
d. Serializable
19. Which of the following occurs when a transaction rereads data it has previously read and finds
modification or deletions caused by a committed transaction?
a. Nonrepeatable read
b. Phantom read
c. Dirty read
d. Consistent read
20. A transaction may not always complete its execution successfully. Such a transaction is termed
a. Aborted
b. Terminated
c. Closed
d. maintaining data
d. None of these
23. ____________ is an interface between low level database and application program.
a. Database Associator
b. Database Server
c. Database Manage
d. None of these
3. Security Enforcement
4. Database Definition and Schema Generation
a. 1 and 2
b. 3 and 1
c. 1, 2 and 3
d. All of these
25. Who detects the failure of the system and restore the database to consistent state ?
a. Database Administrator
b. Application Programmer
c. Naive User
d. Storage Manager
27. Which of the following is the preferred way to recover a database after a transaction in progress
terminates abnormally?
a. Rollback
b. Rollforward
d. Reprocess transactions
28. Which of the following is the preferred way to recover a database after a system failure?
a. Rollback
b. Rollforward
d. Reprocess transactions
29. Concurrency control is important for which of the following reasons?
a. To ensure data integrity when updates occur to the database in a multiuser environment
b. To ensure data integrity when updates occur to the database in a single-user environment
c. To ensure data integrity while reading data occurs to the database in a multiuser environment
d. To ensure data integrity while reading data occurs to the database in a single-user environment
30. A shared lock allows which of the following types of transactions to occur?
a. Delete
b. Insert
c. Read
d. Update
a. Erroneous updates
b. Deadlock
c. Versioning
a. Authentication policies
36. If both data and database administration exist in an organization, the database administrator is
responsible for which of the following?
a. Data modeling
b. Database design
c. Metadata
a. Is free or nearly free database software whose source code is publicly available
b. Is free or nearly free database software whose source code is not publicly available
a. The time to make a decision but not the typical roles of a database administrator
b. The time to make a decision and the typical roles of a database administrator
41. Which of the following contains a complete record of all activity that affected the contents of a
database during a certain period of time?
a. report writer
b. query language
d. transaction log
42. In database management system, the executing process or executing program which considers the
updating or reading of records stored in database is called
a. conceptualization
b. execution
c. implementation
d. transaction
43. The application of database management system in air flight seat booking in a way that one seat is
accessed by only one clerk for customer reservation is classified as
44. Collections of operations that form a single logical unit of work are called __________
a. Views
b. Networks
c. Units
d. Transactions
a. Isolation
b. Durability
c. Atomicity
a. Atomicity
b. Durability
c. Isolation
a. Atomicity
b. Consistency
c. Durability
a. Atomicity
b. Simplicity
c. Isolation
d. Durability
a. Recovery system
b. Atomic system
d. Compiler system
a. Recovery system
b. Atomic system
d. Compiler system
51. State true or false: Information residing in the volatile storage does not usually survive system
crashes
a. True
b. False
c. May be
d. Can't say
52. A transaction that has not been completed successfully is called as _______
a. Compensating transaction
b. Aborted transaction
c. Active transaction
a. Active
b. Partially committed
c. Failed
d. Compensated
a. Serials
b. Schedules
c. Organizations
d. Time tables
55. The scheme that controls the interaction between executing transactions is called as _____
b. Multiprogramming scheme
c. Serialization scheme
d. Schedule scheme
56. I and J are _________ if they are operations by different transactions on the same data item, and at
least one of them is a write operation.
a. Conflicting
b. Overwriting
c. Isolated
d. Durable
b. Equal
c. Conflict equivalent
d. Isolation equivalent
a. Conflict serializable
b. Conflicting
c. Non serializable
59. The set of ________ in a precedence graph consists of all the transactions participating in the
schedule
a. Vertices
b. Edges
c. Directions
60. A ___________of the transactions can be obtained by finding a linear order consistent with the
partial order of the precedence graph.
a. Serializability order
b. Direction graph
c. Precedence graph
d. Scheduling scheme
61. State true or false: If I = read(Q) and J = read(Q) then the order of I and J does not matter.
a. True
b. False
c. May be
d. Can't say
62. State true or false: If I = read(Q) and J = write(Q) then the order of I and J does not matter.
a. True
b. False
c. May be
d. Can't say
a. Timestamping
b. Plain locking
c. Predicate locking
d. Snapshot isolation
a. Partial schedule
b. Complete schedule
c. Dependent schedule
d. Independent schedule
65. The phenomenon in which one failure leads to a series of transaction rollbacks is called as ________
a. Cascading rollback
b. Cascadeless rollback
c. Cascade cause
a. True
b. False
c. May be
d. Can't say
67. A ___________ is one where, for each pair of transactions Ti and Tj such that Tj reads a data item
previously written by Ti , the commit operation of Ti appears before the commit operation of Tj
a. Partial schedule
b. Dependent schedule
c. Recoverable schedule
a. True
b. False
c. May be
d. Can't say
a. Increased throughput
b. Increased utilization
70. The average time for a transaction to be completed after it has been submitted is called as
__________
a. Serializable schedule
b. Equivalent schedule
c. Committed schedule
a. Partial schedule
b. Dependent schedule
c. Recoverable schedule
73. Which of the following is a transaction isolation level as specified by SQL standard?
a. Serializable
b. Repeatable read
c. Read committed
74. State true or false: Serializable level may allow both serializable and non-serializable executions
a. True
b. False
c. May be
d. Can't say
75. ________ allows only committed data to be read and further requires that no other transaction is
allowed to update it between two reads of a data item by a transaction.
a. Read uncommitted
b. Serializable
c. Repeatable read
d. Read committed
76. ________ allows only committed data to be read, but does not require repeatable reads
a. Read uncommitted
b. Serializable
c. Repeatable read
d. Read committed
a. Read uncommitted
b. Serializable
c. Repeatable read
d. Read committed
78. State true or false: All the isolation levels disallow dirty writes
a. True
b. False
c. May be
d. Can't say
80. In ___________ isolation each transaction is given its own version of the database
a. Timestamp
b. Snapshot
c. Lock based
b. Is not atomic
c. Is not durable
82. Consider money is transferred from (1)account-A to account-B and (2) account-B to account-A.
Which of the following form a transaction ?
a. Only 1
b. Only 2
d. Either 1 or 2
83. A transaction is delimited by statements (or function calls) of the form __________
a. Atomicity
b. Durability
c. Isolation
a. Atomicity
b. Durability
c. Isolation
86. The database system must take special actions to ensure that transactions operate properly without
interference from concurrently executing database statements. This property is referred to as
a. Atomicity
b. Durability
c. Isolation
a. Atomicity
b. Durability
c. Isolation
88. __________ states that only valid data will be written to the database.
a. Consistency
b. Atomicity
c. Durability
d. Isolation
89. The Oracle RDBMS uses the ____ statement to declare a new transaction start and its properties.
a. BEGIN
b. SET TRANSACTION
c. BEGIN TRANSACTION
d. COMMIT
90. ____ means that the data used during the execution of a transaction cannot be used by a second
transaction until the first one is completed.
a. Consistency
b. Atomicity
c. Durability
d. Isolation
91. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT
statements in a single transaction?
a. CREATE PACKAGE
b. CREATE SCHEMA
c. CREATE CLUSTER
92. Which character function can be used to return a specified portion of a character string?
a. INSTR
b. SUBSTRING
c. SUBSTR
d. POS
93. Which of the following is TRUE for the System Variable $date$?
a. Can be assigned to a global variable
a. Define, Create
b. Drop, Comment
d. Select, Commit
95. The SQL statement SELECT SUBSTR(‘123456789’, INSTR(‘abcabcabc’,’b’), 4) FROM EMP; prints
a. 6789
b. 2345
c. 1234
d. 456789
96. Which of the following SQL command can be used to modify existing data in a database table?
a. MODIFY
b. UPDATE
c. CHANGE
d. NEW
97. When SQL statements are embedded inside 3GL, we call such a program as
a. Nested query
b. Nested programming
c. Distinct query
d. Embedded SQL
98. _______________ provides option for entering SQL queries as execution time, rather than at the
development stage.
a. PL/SQL
b. SQL*Plus
c. SQL
d. Dynamic SQL
99. Each modification done in database transaction are first recorded into the
a. Harddrive
b. Log
c. Disk
d. Datamart
100. _______ means that data used during the execution of a transaction cannot be used by a second
transaction until the first one is completed.
a. Serializability
b. Atomicity
c. Isolation
d. Time stamping
a. Active
b. Terminated
c. Aborted
d. Partially committed
a. Outer
b. Inner
c. Equi
103. The ________________ is essentially used to search for patterns in target string.
a. Like Predicate
b. Null Predicate
c. In Predicate
d. Out Predicate
b. Delete database_name
d. drop database_name
a. Composite Key
b. Alternate Key
c. Candidate Key
d. Foreign Key
a. Compile queries
b. Query optimization
c. Receive queries
d. Result formatting and presentation
108. ____________ is a special type of stored procedure that is automatically invoked whenever the
data in the table is modified.
a. Procedure
b. Trigger
c. Curser
109. ______________ requires that data should be made available to only authorized users.
a. Data integrity
b. Privacy
c. Security
111. ____________ allows individual row operation to be performed on a given result set or on the
generated by a selected by a selected statement.
a. Procedure
b. Trigger
c. Curser
a. Data
b. Database
c. Database design
113. Which is primarily the result of a thorough understanding of information about an enterprise:
a. Data
b. Database
c. Database design
d. Data modeling
d. Database management
115. The database design prevents some data from being represented due to _______
a. Deletion anomalies
b. Insertion anomalies
c. Update anomaly
a. 1
b. 2
c. 3
d. 4
a. E.F. codd
b. F.F. codd
c. E.E. codd
a. 1969
b. 1970
c. 1971
d. 1972
a. Functional dependency
b. Database modeling
c. Normalization
d. Decomposition
120. Which formal method that locates and analyses relation schemas on the basis of their primary,
candidate keys, and the FD’s that are present among the attributes of these schemas:
a. Functional dependency
b. Database modeling
c. Normalization
d. Decomposition
121. Which is refers to a stalemate situation due to which no further progress is possible as computer
await response of each other:
a. Concurrency
b. Deadlock
c. Backup
d. Recovery
122. Which is a duplicate copy of a file program that is stored on a different storage media than the
original location:
a. Concurrency
b. Deadlock
c. Backup
d. Recovery
123. Which is duplication of computer operations and routine backups to combat any unforeseen
problems:
a. Concurrency
b. Deadlock
c. Backup
d. Recovery
124. Optimization that is basically related to the rewriter module is termed as__________
a. Internal users
b. External users
c. Non-external users
b. Backup
c. Recovery
d. Deadlock
a. 2
b. 3
c. 4
d. 5
a. Deferred update
b. Immediate update
130. Which server can joins the indexes when only multiple indexes combined can cover the query:
a. SQL
b. DBMS
c. RDBMS
a. Entire database
132. A concurrency-control policy such as this one leads to ______ performance, since it forces
transactions to wait for preceding transactions to finish before they can start.
a. Good
b. Average
c. Poor
d. Unstable
133. __________ are used to ensure that transactions access each data item in order of the
transactions’ ____ if their accesses conflict.
a. Zone
b. Relay
c. Line
d. Timestamps
134. EMPDET is an external table containing the columns EMPNO and ENAME. Which command would
work in relation to the EMPDET table?
a. UPDATE empdet
AS
d. CREATE INDEX
empdet_idx
ON empdet(empno);
135. In which scenario would you use the ROLLUP operator for expression or columns within a GROUP
BY clause?
b. To create group-wise grand totals for the groups specified within a GROUP BY clause
c. To create a grouping for expressions or columns specified within a GROUP BY clause in one direction,
from right to left for calculating the subtotals
d. To create a grouping for expressions or columns specified within a GROUP BY clause in all possible
directions, which is cross-tabular report for calculating the subtotals
b. The data and metadata for an external table are stored outside the database
c. ORACLE_LOADER and ORACLE_DATAPUMP have exactly the same functionality when used with an
external table
d. The CREATE TABLE AS SELECT statement can be used to unload data into regular table in the database
from an external table
a. A set of sequential queries, all of which must always return a single value
b. A set of sequential queries, all of which must return values from the same table
c. A SELECT statement that can be embedded in a clause of another SELECT statement only
d. A set of one or more sequential queries in which generally the result of the inner query is used as the
search value in the outer query
c. It does not recover any of the tables because FLASHBACK is not possible in this case
d. It recovers both the tables but the names would be changed to the ones assigned in the RECYCLEBIN
a. Atomicity
b. Concurrency
c. Isolation
d. Durability
a. Synonym
b. Tablespace
c. System server
a. Transaction management
b. Application programmer
c. Concurrency control
d. Recovery management
143. Constraint checking can be disabled in existing _______________ and _____________ constraints
so that any data you modify or add to the table is not checked against the constraint.