0% found this document useful (0 votes)
29 views30 pages

143 Quastion

Same

Uploaded by

getubekele1989
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views30 pages

143 Quastion

Same

Uploaded by

getubekele1989
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 30

1.

With regards to transaction processing, any DBMS should be capable of:

a. Ensuring that transactions are free from interference from other users.

b. Parts of a transaction are not lost due to a failure.

c. Transactions do not make the database inconsistent.

d. All of the above.

2. What is ACID properties of Transactions?

a. Atomicity, Consistency, Isolation, Database

b. Atomicity, Consistency, Isolation, Durability

c. Atomicity, Consistency, Inconsistent, Durability

d. Automatically, Concurrency, Isolation, Durability

3. Database locking concept is used to solve the problem of

a. Lost Update

b. Uncommitted Dependency

c. Inconsistent Data

d. All of the above

4. A lock that allows concurrent transactions to access different rows of the same table is known as a

a. Field-level lock

b. Row-level lock

c. Table-level lock

d. Database-level lock

5. A transaction completes its execution is said to be

a. Saved

b. Loaded

c. Rolled

d. Committed
6. A system is in a ______ state if there exists a set of transactions such that every transaction in the set
is waiting for another transaction in the set.

a. Idle

b. Waiting

c. Deadlock

d. Ready

7. The deadlock state can be changed back to stable state by using _____________ statement.

a. Commit

b. Rollback

c. Savepoint

d. Deadlock

8. What are the ways of dealing with deadlock ?

a. Deadlock prevention

b. Deadlock recovery

c. Deadlock detection

d. All of the mentioned

9. When transaction Ti requests a data item currently held by Tj , Ti is allowed to wait only if it has a
timestamp smaller than that of Tj (that is, Ti is older than Tj ). Otherwise, Ti is rolled back (dies). This is

a. Wait-die

b. Wait-wound

c. Wound-wait

d. Wait

10. When transaction Ti requests a data item currently held by Tj , Ti is allowed to wait only if it has a
timestamp larger than that of Tj (that is, Ti is younger than Tj ). Otherwise, Tj is rolled back (Tj is
wounded by Ti ). This is

a. Wait-die

b. Wait-wound
c. Wound-wait

d. Wait

11. The deadlock in a set of transaction can be determined by

a. Read-only graph

b. Wait graph

c. Wait-for graph

d. All of the mentioned

12. A deadlock exists in the system if and only if the wait-for graph contains a ___________.

a. Cycle

b. Direction

c. Bi-direction

d. Rotation

13. Selecting the victim to be rollbacked to the previous state is determined by the minimum cost. The
factors determining cost of rollback is

a. How long the transaction has computed, and how much longer the transaction will compute before it
completes its designated task.

b. How many data items the transaction has used.

c. How many more data items the transaction needs for it to complete and how many transactions will
be involved in the rollback.

d. All of the above

14. __________ rollback requires the system to maintain additional information about the state of all
the running transactions.

a. Total

b. Partial

c. Time

d. Commit

15. Which of these is data type long literal?


a. 0x99fffL

b. ABCDEFG

c. 0x99fffa

d. 99671246

16. Which of the following occurs when a transaction rereads data and finds new rows that were
inserted by a command transaction since the prior read?

a. Nonrepeatable read

b. Phantom read

c. Dirty read

d. Consistent read

17. A transaction for which all committed changes are permanent is called:

a. atomic

b. consistent

c. isolated

d. durable

18. In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are
allowed.

a. Read committed

b. Read uncommitted

c. Repeatable read

d. Serializable

19. Which of the following occurs when a transaction rereads data it has previously read and finds
modification or deletions caused by a committed transaction?

a. Nonrepeatable read

b. Phantom read

c. Dirty read

d. Consistent read
20. A transaction may not always complete its execution successfully. Such a transaction is termed

a. Aborted

b. Terminated

c. Closed

d. All of the mentioned

21. Transaction processing is associated with everything below except

a. producing detail, summary, or exception reports

b. recording a business activity

c. confirming an action or triggering a response

d. maintaining data

22. Transaction management ensures ____________ and __________ properties.

a. Atomicity and Intigrity

b. Atomicity and Durability

c. Atomicity and Abstraction

d. None of these

23. ____________ is an interface between low level database and application program.

a. Database Associator

b. Database Server

c. Database Manage

d. None of these

24. Which of the following are functions of Database Manager ?

1. Interacting with File Manager

2. Creating Queries to Access data

3. Security Enforcement
4. Database Definition and Schema Generation

a. 1 and 2

b. 3 and 1

c. 1, 2 and 3

d. All of these

25. Who detects the failure of the system and restore the database to consistent state ?

a. Database Administrator

b. Application Programmer

c. Naive User

d. Storage Manager

26. A traditional data administrator performs which of the following roles?

a. Tune database performance

b. Establish backup and recovery procedures

c. Resolve data ownership issues

d. Protect the security of the database.

27. Which of the following is the preferred way to recover a database after a transaction in progress
terminates abnormally?

a. Rollback

b. Rollforward

c. Switch to duplicate database

d. Reprocess transactions

28. Which of the following is the preferred way to recover a database after a system failure?

a. Rollback

b. Rollforward

c. Switch to duplicate database

d. Reprocess transactions
29. Concurrency control is important for which of the following reasons?

a. To ensure data integrity when updates occur to the database in a multiuser environment

b. To ensure data integrity when updates occur to the database in a single-user environment

c. To ensure data integrity while reading data occurs to the database in a multiuser environment

d. To ensure data integrity while reading data occurs to the database in a single-user environment

30. A shared lock allows which of the following types of transactions to occur?

a. Delete

b. Insert

c. Read

d. Update

31. Locking may cause which of the following problems?

a. Erroneous updates

b. Deadlock

c. Versioning

d. All of the above.

32. Performance analysis and tuning is which of the following?

a. Undertaken one time at the time of a DBMS installation

b. Undertaken one time at the time of the implementation of a new application

c. Undertaken as an ongoing part of the backup of a database

d. Undertaken as an ongoing part of managing a database

33. Which of the following could cause data to be unavailable?

a. Data becoming lost or inaccurate

b. The database server

c. Planned database maintenance activities

d. All of the above.


34. The transaction log includes which of the following?

a. The before-image of a record

b. The after-image of a record

c. The before and after-image of a record

d. The essential data of the record

35. Which of the following is part of an administrative policy to secure a database?

a. Authentication policies

b. Limiting particular areas within a building to only authorized people

c. Ensure appropriate responses rates are in external maintenance agreements

d. All of the above.

36. If both data and database administration exist in an organization, the database administrator is
responsible for which of the following?

a. Data modeling

b. Database design

c. Metadata

d. All of the above.

37. Which of the following is true concerning open-source DBMS?

a. Is free or nearly free database software whose source code is publicly available

b. Is free or nearly free database software whose source code is not publicly available

c. Is not competitive against PC-oriented packages and is fully SQL compliant

d. Is competitive against PC-oriented packages and is not fully SQL compliant

38. A data warehouse administrator is concerned with which of the following?

a. The time to make a decision but not the typical roles of a database administrator

b. The time to make a decision and the typical roles of a database administrator

c. The typical roles of a data administrator and redesigning existing applications

d. The typical roles of a database administrator and redesigning existing applications


39. Poor data administration can lead to which of the following?

a. A single definition of the same data entity

b. Familiarity with existing data

c. Missing data elements

d. All of the above.

40. Backward recovery is which of the following?

a. Where the before-images are applied to the database

b. Where the after-images are applied to the database

c. Where the after-images and before-images are applied to the database

d. Switching to an existing copy of the database

41. Which of the following contains a complete record of all activity that affected the contents of a
database during a certain period of time?

a. report writer

b. query language

c. data manipulation language

d. transaction log

42. In database management system, the executing process or executing program which considers the
updating or reading of records stored in database is called

a. conceptualization

b. execution

c. implementation

d. transaction

43. The application of database management system in air flight seat booking in a way that one seat is
accessed by only one clerk for customer reservation is classified as

a. online transaction processing

b. offline transaction processing

c. online logical representation


d. offline modeling representation

44. Collections of operations that form a single logical unit of work are called __________

a. Views

b. Networks

c. Units

d. Transactions

45. The “all-or-none” property is commonly referred to as _________

a. Isolation

b. Durability

c. Atomicity

d. None of the mentioned

46. Which of the following is a property of transactions?

a. Atomicity

b. Durability

c. Isolation

d. All of the mentioned

47. Execution of translation in isolation preserves the _________ of a database

a. Atomicity

b. Consistency

c. Durability

d. All of the mentioned

48. Which of the following is not a property of a transaction?

a. Atomicity

b. Simplicity

c. Isolation
d. Durability

49. Which of the following systems is responsible for ensuring durability?

a. Recovery system

b. Atomic system

c. Concurrency control system

d. Compiler system

50. Which of the following systems is responsible for ensuring isolation?

a. Recovery system

b. Atomic system

c. Concurrency control system

d. Compiler system

51. State true or false: Information residing in the volatile storage does not usually survive system
crashes

a. True

b. False

c. May be

d. Can't say

52. A transaction that has not been completed successfully is called as _______

a. Compensating transaction

b. Aborted transaction

c. Active transaction

d. Partially committed transaction

53. Which of the following is not a transaction state?

a. Active

b. Partially committed

c. Failed
d. Compensated

54. The execution sequences in concurrency control are termed as ________

a. Serials

b. Schedules

c. Organizations

d. Time tables

55. The scheme that controls the interaction between executing transactions is called as _____

a. Concurrency control scheme

b. Multiprogramming scheme

c. Serialization scheme

d. Schedule scheme

56. I and J are _________ if they are operations by different transactions on the same data item, and at
least one of them is a write operation.

a. Conflicting

b. Overwriting

c. Isolated

d. Durable

57. If a schedule S can be transformed into a schedule S’ by a series of swaps of non-conflicting


instructions, then S and S’ are

a. Non conflict equivalent

b. Equal

c. Conflict equivalent

d. Isolation equivalent

58. A schedule is __________ if it is conflict equivalent to a serial schedule.

a. Conflict serializable

b. Conflicting
c. Non serializable

d. None of the mentioned

59. The set of ________ in a precedence graph consists of all the transactions participating in the
schedule

a. Vertices

b. Edges

c. Directions

d. None of the mentioned

60. A ___________of the transactions can be obtained by finding a linear order consistent with the
partial order of the precedence graph.

a. Serializability order

b. Direction graph

c. Precedence graph

d. Scheduling scheme

61. State true or false: If I = read(Q) and J = read(Q) then the order of I and J does not matter.

a. True

b. False

c. May be

d. Can't say

62. State true or false: If I = read(Q) and J = write(Q) then the order of I and J does not matter.

a. True

b. False

c. May be

d. Can't say

63. Which of the following is the most expensive method?

a. Timestamping
b. Plain locking

c. Predicate locking

d. Snapshot isolation

64. A transaction that performs only one operation is called as a _________

a. Partial schedule

b. Complete schedule

c. Dependent schedule

d. Independent schedule

65. The phenomenon in which one failure leads to a series of transaction rollbacks is called as ________

a. Cascading rollback

b. Cascadeless rollback

c. Cascade cause

d. None of the mentioned

66. State true or false: Every cascadeless schedule is also recoverable

a. True

b. False

c. May be

d. Can't say

67. A ___________ is one where, for each pair of transactions Ti and Tj such that Tj reads a data item
previously written by Ti , the commit operation of Ti appears before the commit operation of Tj

a. Partial schedule

b. Dependent schedule

c. Recoverable schedule

d. None of the mentioned

68. State true or false: Transactions can only run serially

a. True
b. False

c. May be

d. Can't say

69. Which of the following are the advantages of transaction concurrency?

a. Increased throughput

b. Increased utilization

c. Reduces average response time

d. All of the mentioned

70. The average time for a transaction to be completed after it has been submitted is called as
__________

a. Minimum response time

b. Average response time

c. Average reaction time

d. Minimum reaction time

71. If a schedule is equivalent to a serial schedule, it is called as a _________

a. Serializable schedule

b. Equivalent schedule

c. Committed schedule

d. None of the mentioned

72. Which of the following is not a type of a schedule?

a. Partial schedule

b. Dependent schedule

c. Recoverable schedule

d. None of the mentioned

73. Which of the following is a transaction isolation level as specified by SQL standard?

a. Serializable
b. Repeatable read

c. Read committed

d. All of the mentioned

74. State true or false: Serializable level may allow both serializable and non-serializable executions

a. True

b. False

c. May be

d. Can't say

75. ________ allows only committed data to be read and further requires that no other transaction is
allowed to update it between two reads of a data item by a transaction.

a. Read uncommitted

b. Serializable

c. Repeatable read

d. Read committed

76. ________ allows only committed data to be read, but does not require repeatable reads

a. Read uncommitted

b. Serializable

c. Repeatable read

d. Read committed

77. ___________ allows uncommitted data to be read

a. Read uncommitted

b. Serializable

c. Repeatable read

d. Read committed

78. State true or false: All the isolation levels disallow dirty writes

a. True
b. False

c. May be

d. Can't say

79. When is a timestamp allotted

a. When execution begins

b. When execution is taking place

c. When execution is completed

d. None of the mentioned

80. In ___________ isolation each transaction is given its own version of the database

a. Timestamp

b. Snapshot

c. Lock based

d. All of the mentioned

81. What is the disadvantage of locking?

a. Does not control concurrency

b. Is not atomic

c. Is not durable

d. Has a poor degree of concurrency

82. Consider money is transferred from (1)account-A to account-B and (2) account-B to account-A.
Which of the following form a transaction ?

a. Only 1

b. Only 2

c. Both 1 and 2 individually

d. Either 1 or 2

83. A transaction is delimited by statements (or function calls) of the form __________

a. Begin transaction and end transaction


b. Start transaction and stop transaction

c. Get transaction and post transaction

d. Read transaction and write transaction

84. Identify the characteristics of transactions

a. Atomicity

b. Durability

c. Isolation

d. All of the mentioned

85. Which of the following has “all-or-none” property ?

a. Atomicity

b. Durability

c. Isolation

d. All of the mentioned

86. The database system must take special actions to ensure that transactions operate properly without
interference from concurrently executing database statements. This property is referred to as

a. Atomicity

b. Durability

c. Isolation

d. All of the mentioned

87. The property of transaction that persists all the crashes is

a. Atomicity

b. Durability

c. Isolation

d. All of the mentioned

88. __________ states that only valid data will be written to the database.

a. Consistency
b. Atomicity

c. Durability

d. Isolation

89. The Oracle RDBMS uses the ____ statement to declare a new transaction start and its properties.

a. BEGIN

b. SET TRANSACTION

c. BEGIN TRANSACTION

d. COMMIT

90. ____ means that the data used during the execution of a transaction cannot be used by a second
transaction until the first one is completed.

a. Consistency

b. Atomicity

c. Durability

d. Isolation

91. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT
statements in a single transaction?

a. CREATE PACKAGE

b. CREATE SCHEMA

c. CREATE CLUSTER

d. All of the mentioned

92. Which character function can be used to return a specified portion of a character string?

a. INSTR

b. SUBSTRING

c. SUBSTR

d. POS

93. Which of the following is TRUE for the System Variable $date$?
a. Can be assigned to a global variable

b. Can be assigned to any field only during design time

c. Can be assigned to any variable or field during run time

d. Can be assigned to a local variable

94. What are the different events in Triggers?

a. Define, Create

b. Drop, Comment

c. Insert, Update, Delete

d. Select, Commit

95. The SQL statement SELECT SUBSTR(‘123456789’, INSTR(‘abcabcabc’,’b’), 4) FROM EMP; prints

a. 6789

b. 2345

c. 1234

d. 456789

96. Which of the following SQL command can be used to modify existing data in a database table?

a. MODIFY

b. UPDATE

c. CHANGE

d. NEW

97. When SQL statements are embedded inside 3GL, we call such a program as

a. Nested query

b. Nested programming

c. Distinct query

d. Embedded SQL

98. _______________ provides option for entering SQL queries as execution time, rather than at the
development stage.
a. PL/SQL

b. SQL*Plus

c. SQL

d. Dynamic SQL

99. Each modification done in database transaction are first recorded into the

a. Harddrive

b. Log

c. Disk

d. Datamart

100. _______ means that data used during the execution of a transaction cannot be used by a second
transaction until the first one is completed.

a. Serializability

b. Atomicity

c. Isolation

d. Time stamping

101. Which of the following is not a state in transaction ?

a. Active

b. Terminated

c. Aborted

d. Partially committed

102. _______________ joins are SQL server default

a. Outer

b. Inner

c. Equi

d. None of the Mentioned

103. The ________________ is essentially used to search for patterns in target string.
a. Like Predicate

b. Null Predicate

c. In Predicate

d. Out Predicate

104. Which of the following is/are the Database server functions?

i) Data management ii) Transaction management

iii) Compile queries iv) Query optimization

a. i, ii, and iv only

b. i, ii and iii only

c. ii, iii and iv only

d. All i, ii, iii, and iv

105. To delete a database ___________ command is used

a. Delete database database_name

b. Delete database_name

c. drop database database_name

d. drop database_name

106. ____________ is a combination of two of more attributes used as a primary key

a. Composite Key

b. Alternate Key

c. Candidate Key

d. Foreign Key

107. Which of the following is not the function of client?

a. Compile queries

b. Query optimization

c. Receive queries
d. Result formatting and presentation

108. ____________ is a special type of stored procedure that is automatically invoked whenever the
data in the table is modified.

a. Procedure

b. Trigger

c. Curser

d. None of the Mentioned

109. ______________ requires that data should be made available to only authorized users.

a. Data integrity

b. Privacy

c. Security

d. None of the Mentioned

110. Some of the utilities of DBMS are _____________

i) Loading ii) Backup iii) File organization iv) Process Organization

a. i, ii, and iv only

b. i, ii and iii only

c. ii, iii and iv only

d. All i, ii, iii, and iv

111. ____________ allows individual row operation to be performed on a given result set or on the
generated by a selected by a selected statement.

a. Procedure

b. Trigger

c. Curser

d. None of the Mentioned

112. Which is essential a business problem not a data problem:

a. Data
b. Database

c. Database design

d. All of the mentioned

113. Which is primarily the result of a thorough understanding of information about an enterprise:

a. Data

b. Database

c. Database design

d. Data modeling

114. McFadden has defined normalization in his which book___________

a. Database modern management

b. Management database of modern

c. Modern database management

d. Database management

115. The database design prevents some data from being represented due to _______

a. Deletion anomalies

b. Insertion anomalies

c. Update anomaly

d. None of the mentioned

116. How many types of insertion anomalies:

a. 1

b. 2

c. 3

d. 4

117. Who developed the normalization process:

a. E.F. codd
b. F.F. codd

c. E.E. codd

d. None of the mentioned

118. E.F.Codd developed the normalization process in the which early:

a. 1969

b. 1970

c. 1971

d. 1972

119. Which is the process of breaking a relation into multiple relations:

a. Functional dependency

b. Database modeling

c. Normalization

d. Decomposition

120. Which formal method that locates and analyses relation schemas on the basis of their primary,
candidate keys, and the FD’s that are present among the attributes of these schemas:

a. Functional dependency

b. Database modeling

c. Normalization

d. Decomposition

121. Which is refers to a stalemate situation due to which no further progress is possible as computer
await response of each other:

a. Concurrency

b. Deadlock

c. Backup

d. Recovery

122. Which is a duplicate copy of a file program that is stored on a different storage media than the
original location:
a. Concurrency

b. Deadlock

c. Backup

d. Recovery

123. Which is duplication of computer operations and routine backups to combat any unforeseen
problems:

a. Concurrency

b. Deadlock

c. Backup

d. Recovery

124. Optimization that is basically related to the rewriter module is termed as__________

a. Semantic query optimization

b. Global query optimization

c. All of the Mentioned

d. None of the Mentioned

125. Optimization basically related to the Rewrite module is termed as_______

a. Semantic query optimization

b. Global query optimization

c. All of the Mentioned

d. None of the Mentioned

126. Database security helps organizations to protect data from _____

a. Internal users

b. External users

c. Non-external users

d. Non internal users

127. Copying files to secondary or specific devices is known as ______


a. Retrieve

b. Backup

c. Recovery

d. Deadlock

128. How many types of recovery control techniques:

a. 2

b. 3

c. 4

d. 5

129. Which are types of recovery control techniques:

a. Deferred update

b. Immediate update

c. All of the Mentioned

d. None of the Mentioned

130. Which server can joins the indexes when only multiple indexes combined can cover the query:

a. SQL

b. DBMS

c. RDBMS

d. All of the mentioned

131. In concurrency control policy the the lock is obtained on

a. Entire database

b. A particular transaction alone

c. All the new elements

d. All of the mentioned

132. A concurrency-control policy such as this one leads to ______ performance, since it forces
transactions to wait for preceding transactions to finish before they can start.
a. Good

b. Average

c. Poor

d. Unstable

133. __________ are used to ensure that transactions access each data item in order of the
transactions’ ____ if their accesses conflict.

a. Zone

b. Relay

c. Line

d. Timestamps

134. EMPDET is an external table containing the columns EMPNO and ENAME. Which command would
work in relation to the EMPDET table?

a. UPDATE empdet

SET ename = 'Amit'

WHERE empno = 1234;

b. DELETE FROM empdet

WHERE ename LIKE 'J%';

c. CREATE VIEW empvu

AS

SELECT * FROM empdept;

d. CREATE INDEX

empdet_idx

ON empdet(empno);

135. In which scenario would you use the ROLLUP operator for expression or columns within a GROUP
BY clause?

a. To find the groups forming the subtotal in a row

b. To create group-wise grand totals for the groups specified within a GROUP BY clause
c. To create a grouping for expressions or columns specified within a GROUP BY clause in one direction,
from right to left for calculating the subtotals

d. To create a grouping for expressions or columns specified within a GROUP BY clause in all possible
directions, which is cross-tabular report for calculating the subtotals

136. Which statement is true regarding external tables?

a. The default REJECT LIMIT for external tables is UNLIMITED

b. The data and metadata for an external table are stored outside the database

c. ORACLE_LOADER and ORACLE_DATAPUMP have exactly the same functionality when used with an
external table

d. The CREATE TABLE AS SELECT statement can be used to unload data into regular table in the database
from an external table

137. A non-correlated subquery can be defined as ______

a. A set of sequential queries, all of which must always return a single value

b. A set of sequential queries, all of which must return values from the same table

c. A SELECT statement that can be embedded in a clause of another SELECT statement only

d. A set of one or more sequential queries in which generally the result of the inner query is used as the
search value in the outer query

138. Evaluate the following SQL statements in the given order.

Which statement is true regarding the above FLASHBACK operation?

a. It recovers only the first DEPT table

b. It recovers only the second DEPT table

c. It does not recover any of the tables because FLASHBACK is not possible in this case

d. It recovers both the tables but the names would be changed to the ones assigned in the RECYCLEBIN

139. What would be the outcome of the below query?

a. It would not display any values

b. It would display the value TWO once

c. It would display the value TWO twice


d. It would display the values ONE, TWO, and TWO

140. Which of the following is not a property of transactions?

a. Atomicity

b. Concurrency

c. Isolation

d. Durability

141. SNAPSHOT is used for (DBA)

a. Synonym

b. Tablespace

c. System server

d. Dynamic data replication

142. Isolation of the transactions is ensured by

a. Transaction management

b. Application programmer

c. Concurrency control

d. Recovery management

143. Constraint checking can be disabled in existing _______________ and _____________ constraints
so that any data you modify or add to the table is not checked against the constraint.

a. CHECK, FOREIGN KEY

b. DELETE, FOREIGN KEY

c. CHECK, PRIMARY KEY

d. PRIMARY KEY, FOREIGN KEY

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy