Top 1000+ Solved DataBase Management System (DBMS) MCQ Questions Answer
Q. The deadlock can be handled by
a. removing the nodes that are deadlocked
b. restarting the search after releasing the lock
c. restarting the search without releasing the lock
d. resuming the search
Q. In crabbing protocol, the lock obtained on the root node is in mode.
a. shared
b. exclusive
c. read only
d. none of the mentioned
Q. If needed to split a node or coalesce it with its siblings, or redistribute key values between siblings, the crabbing protocol locks the parent of the node in mode.
a. shared
b. exclusive
c. read only
d. none of the mentioned
Q. Instead of locking index leaf nodes in a two-phase manner, some index concurrency- control schemes use on individual key values, allowing other key values to be inserted or deleted from the same leaf.
a. b+ tree locking
b. link level locking
c. key-value locking
d. next value locking
Q. The recovery scheme must also provide
a. high availability
b. low availability
c. high reliability
d. high durability
Q. Which one of the following is a failure to a system
a. boot crash
b. read failure
c. transaction failure
d. all of the mentioned
Q. The system has entered an undesirable state (for example, deadlock), as a result of which a transaction cannot continue with its normal execution. This is
a. read error
b. boot error
c. logical error
d. system error
Q. The assumption that hardware errors and bugs in the software bring the system to a halt, but do not corrupt the nonvolatile storage contents, is known as the
a. stop assumption
b. fail assumption
c. halt assumption
d. fail-stop assumption
Q. The log is a sequence of recording all the update activities in the database.
a. log records
b. records
c. entries
d. redo
Q. The scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.
a. shadow copy
b. shadow paging
c. update log records
d. all of the mentioned
Q. In the phase, the system replays updates of all transactions by scanning the log forward from the last checkpoint.
a. repeating
b. redo
c. replay
d. undo
Q. The actions which are played in the order while recording it is called history.
a. repeating
b. redo
c. replay
d. undo
Q. A special redo-only log record < Ti, Xj, V1> is written to the log, where V1 is the value being restored to data item Xj during the rollback. These log records are sometimes called
a. log records
b. records
c. compensation log records
d. compensation redo records
Q. The silicon chips used for data processing are called
a. ram chips
b. rom chips
c. micro processors
d. prom chips