On This Page

This set of DataBase Management System (DBMS) Multiple Choice Questions & Answers (MCQs) focuses on Database Management System Set 30

Q1 | What was the name of the first commercially available microprocessor chip?
  • intel 308
  • intel 33
  • intel 4004
  • motorola 639
Q2 | The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as
  • magnetic core memory
  • magnetic tape memory
  • magnetic disk memory
  • magnetic bubble memory
Q3 | The ALU of a computer normally contains a number of high speed storage element called
  • semiconductor memory
  • registers
  • hard disks
  • magnetic disk
Q4 | A dump of the database contents is also referred to as an                            dump.
  • archival
  • fuzzy
  • sql
  • all of the mentioned
Q5 |                  dump, writes out SQL DDL statements and SQL insert statements to a file, which can then be reexecuted to re- create the database.
  • archival
  • fuzzy
  • sql
  • all of the mentioned
Q6 |                    dump schemes have been developed that allow transactions to be active while the dump is in progress.
  • archival
  • fuzzy
  • sql
  • all of the mentioned
Q7 | ARIES uses a                        to identify log records, and stores it in database pages.
  • log sequence number
  • log number
  • lock number
  • sequence
Q8 | ARIES supports                        operations, which are physical in that the affected page is physically identified, but can be logical within the page.
  • physiological redo
  • physiological undo
  • logical redo
  • logical undo
Q9 |                              is used to minimize unnecessary redos during recovery.
  • dirty page table
  • page table
  • dirty redo
  • all of the mentioned
Q10 |                      scheme that records only information about dirty pages and associated information and does not even require of writing dirty pages to disk.
  • fuzzy logic
  • checkpoints
  • fuzzy-checkpoint
  • logical checkpoint
Q11 | Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the                field of the page.
  • lsn
  • readlsn
  • pagelsn
  • redolsn
Q12 | The                                      contains a list of pages that have been updated in the database buffer.
  • dirty page table
  • page table
  • dirty redo
  • all of the mentioned
Q13 |                        determines which transactions to undo, which pages were dirty at the time of the crash, and the LSN from which the redo pass should start.
  • analysis pass
  • redo pass
  • undo pass
  • none of the mentioned
Q14 |                      starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash.
  • analysis pass
  • redo pass
  • undo pass
  • none of the mentioned
Q15 |                              rolls back all transactions that were incomplete at the time of crash.
  • analysis pass
  • redo pass
  • undo pass
  • none of the mentioned
Q16 | Which lock should be obtained to prevent a concurrent transaction from executing a conflicting read, insert or delete operation on the same key value.
  • higher-level lock
  • lower-level lock
  • read only lock
  • read write
Q17 | Once the lower-level lock is released, the operation cannot be undone by using the old values of updated data items, and must instead be undone by executing a compensating operation; such an operation is called
  • logical operation
  • redo operation
  • logical undo operation
  • undo operation
Q18 | Which of the following is used for undo operations alone?
  • logical logging
  • physical logging
  • physical log records
  • physical logging and physical log records
Q19 | Redo operations are performed exclusively using
  • logical logging
  • physical logging
  • physical log records
  • both physical logging and physical log records
Q20 | An operation is said to be                      if executing it several times in a row gives the same result as executing it once.
  • idempotent
  • changed
  • repetitive
  • all of the above
Q21 | Immediate database modification technique uses
  • both undo and redo
  • undo but no redo
  • redo but no undo
  • neither undo nor redo
Q22 | Shadow paging has
  • no redo
  • no undo
  • redo but no undo
  • neither redo nor undo
Q23 | For correct behaviour during recovery, undo and redo operation must be
  • commutative
  • associative
  • idempotent
  • distributive
Q24 | If                        are not obtained in undo operation it will cause problem in undo- phase.
  • higher-level lock
  • lower-level lock
  • read only lock
  • read write
Q25 | The remote backup site is sometimes also called the
  • primary site
  • secondary site
  • tertiary site
  • none of the mentioned