Filters
Question type

Study Flashcards

The last step in the write-through technique recovery procedure is to identify the last checkpoint in the transaction log.

A) True
B) False

Correct Answer

verifed

verified

Although the DBMS is designed to recover a database to a previous consistent state when an interruption prevents the completion of a required set of transactions,the transactions themselves are defined by the end user or programmer and must be semantically correct.

A) True
B) False

Correct Answer

verifed

verified

As long as two transactions,T1 and T2,access ____ data,there is no conflict,and the order of execution is irrelevant to the final outcome.


A) shared
B) common
C) unrelated
D) locked

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

The ____________________ interleaves the execution of database operations to ensure serializability.

Correct Answer

verifed

verified

Lock ____ indicates the level of lock use.


A) granularity
B) shrinking
C) growing
D) serializability

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A ____ lock locks the entire diskpage.


A) transaction-level
B) table-level
C) page-level
D) row-level

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What is a rule that applies to the two-phase locking protocol?


A) Two transactions cannot have conflicting locks.
B) No unlock operation can precede a lock operation in a different transaction.
C) No data is affected until all locks are released.
D) No data is affected until the transaction is in its locked position.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

A single-user database system automatically ensures ____ of the database,because only one transaction is executed at a time.


A) serializability and durability
B) atomicity and isolation
C) serializability and isolation
D) atomicity and serializability

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

C

The transaction recovery write-ahead-log protocol ensures that transaction logs are always written before any database data are actually updated.

A) True
B) False

Correct Answer

verifed

verified

True

____ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.


A) Serializability
B) Atomicity
C) Isolation
D) Time stamping

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

ANSI defines four events that signal the end of a transaction.Of the following events,which is defined by ANSI as being equivalent to a ROLLBACK?


A) Five SQL statements are executed.
B) The end of a program is successfully reached.
C) The program is abnormally terminated.
D) The database is shut down for maintenance.

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Incomplete or improper transactions can have a devastating effect on database integrity.

A) True
B) False

Correct Answer

verifed

verified

To determine the appropriate order of the operations,the scheduler bases its actions on concurrency control algorithms,such as ____________________ or time stamping methods.

Correct Answer

verifed

verified

locking

A shared lock produces no conflict as long as all the concurrent transactions are read-write only.

A) True
B) False

Correct Answer

verifed

verified

When using an optimistic approach,a transaction reads the database,executes the needed computations,and makes the updates to a private copy of the database values.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____ phase in a two-phase lock is when a transaction releases all locks and cannot obtain any new lock.


A) growing
B) shrinking
C) locking
D) unlocking

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A ____ lock prevents the use of any tables in the database from one transaction while another transaction is being processed.


A) database-level
B) table-level
C) page-level
D) row-level

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

____ requires that all operations of a transaction be completed.


A) Specificity
B) Atomicity
C) Durability
D) Time stamping

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

In the optimistic approach,during the ____ phase,a transaction scans the database,executes the needed computations,and makes the updates to a private copy of the database values.


A) read
B) validation
C) write
D) shared

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

____ are required to prevent another transaction from reading inconsistent data.


A) Locks
B) Schedules
C) Stamps
D) Logs

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 1 - 20 of 70

Related Exams

Show Answer