Database Management System Set 30
Computer Science Engineering (CSE),
Bachelor of Science in Computer Science FY (BSc CS),
Bachelor of Science in Computer Science SY (BSc CS),
Bachelor of Science in Information Technology SY (BSc IT),
Bachelor of Computer Applications (BCA),
Bachelor of Business Administration in Computer Applications (BBA [CA]),
Bachelor of Science in Information Technology (BSc IT),
On This Page
This set of DataBase Management System (DBMS) Multiple Choice Questions & Answers (MCQs) focuses on Database Management System Set 30
Q1 | What was the name of the first commercially available microprocessor chip?
- intel 308
- intel 33
- intel 4004
- motorola 639
Q2 | The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as
- magnetic core memory
- magnetic tape memory
- magnetic disk memory
- magnetic bubble memory
Q3 | The ALU of a computer normally contains a number of high speed storage element called
- semiconductor memory
- registers
- hard disks
- magnetic disk
Q4 | A dump of the database contents is also referred to as an dump.
- archival
- fuzzy
- sql
- all of the mentioned
Q5 | dump, writes out SQL DDL statements and SQL insert statements to a file, which can then be reexecuted to re- create the database.
- archival
- fuzzy
- sql
- all of the mentioned
Q6 | dump schemes have been developed that allow transactions to be active while the dump is in progress.
- archival
- fuzzy
- sql
- all of the mentioned
Q7 | ARIES uses a to identify log records, and stores it in database pages.
- log sequence number
- log number
- lock number
- sequence
Q8 | ARIES supports operations, which are physical in that the affected page is physically identified, but can be logical within the page.
- physiological redo
- physiological undo
- logical redo
- logical undo
Q9 | is used to minimize unnecessary redos during recovery.
- dirty page table
- page table
- dirty redo
- all of the mentioned
Q10 | scheme that records only information about dirty pages and associated information and does not even require of writing dirty pages to disk.
- fuzzy logic
- checkpoints
- fuzzy-checkpoint
- logical checkpoint
Q11 | Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the field of the page.
- lsn
- readlsn
- pagelsn
- redolsn
Q12 | The contains a list of pages that have been updated in the database buffer.
- dirty page table
- page table
- dirty redo
- all of the mentioned
Q13 | determines which transactions to undo, which pages were dirty at the time of the crash, and the LSN from which the redo pass should start.
- analysis pass
- redo pass
- undo pass
- none of the mentioned
Q14 | starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash.
- analysis pass
- redo pass
- undo pass
- none of the mentioned
Q15 | rolls back all transactions that were incomplete at the time of crash.
- analysis pass
- redo pass
- undo pass
- none of the mentioned
Q16 | Which lock should be obtained to prevent a concurrent transaction from executing a conflicting read, insert or delete operation on the same key value.
- higher-level lock
- lower-level lock
- read only lock
- read write
Q17 | Once the lower-level lock is released, the operation cannot be undone by using the old values of updated data items, and must instead be undone by executing a compensating operation; such an operation is called
- logical operation
- redo operation
- logical undo operation
- undo operation
Q18 | Which of the following is used for undo operations alone?
- logical logging
- physical logging
- physical log records
- physical logging and physical log records
Q19 | Redo operations are performed exclusively using
- logical logging
- physical logging
- physical log records
- both physical logging and physical log records
Q20 | An operation is said to be if executing it several times in a row gives the same result as executing it once.
- idempotent
- changed
- repetitive
- all of the above
Q21 | Immediate database modification technique uses
- both undo and redo
- undo but no redo
- redo but no undo
- neither undo nor redo
Q22 | Shadow paging has
- no redo
- no undo
- redo but no undo
- neither redo nor undo
Q23 | For correct behaviour during recovery, undo and redo operation must be
- commutative
- associative
- idempotent
- distributive
Q24 | If are not obtained in undo operation it will cause problem in undo- phase.
- higher-level lock
- lower-level lock
- read only lock
- read write
Q25 | The remote backup site is sometimes also called the
- primary site
- secondary site
- tertiary site
- none of the mentioned