The log based recovery techniques are classified into two Types MCQ

Page 1 :
Tick the Appropriate Answer, , 1., , 2., , 3., , 4., , 5., , 6., , 7., , 8., , 9., , 10., , 11., , 12., , 13., , Which of the following is related to information :, (b) communication, (a) data, (c) knowledge, (d) all of these, Data is:, (a) a piece of fact, (b) metadata, (c) information, (d) none of these, Which of the following is element of database :, (a) data, (b) constraints and schema, ( c) relationships, (d) all of these, What represent a correspondance between the data elements :, (b) constraints, (a) data, (c) relationships, (d) schema, Which of the following is an advantage of using database system :, (a) security enforcement, (b) avoidance of redundancy, (c) reduced inconsistancy, (d) all of these, Which of the following is characteristic of the data in the database :, (a) independent, (b) secure, ( c) shared, (d) all of these, The name of the system database that contains descriptions of data in the database is :, (a) data dictionary, (b) metadata, (c) table, (d) none of these, Following is the type of metadata :, (b) EDW, (a) Operational, (d) all of these, (c) Datamart, System catalog is a system-created database that describes:, (a) database objects, (b) data dictionary information, ( c) user access information, (d) all of these, Relationships could be following type :, (a) one-to-one relationship, (b) one-to-many relationship, (c) many-to-many relationship, (d) all of these, In a file-oriented system there is :, (a) data inconsistancy, (b) duplication of data, ( c) data dependance, (d) all of these, In a database system there is :, (b) improved security, (a) increased product~vity, (d) all of these, (c) ccono~ly of scale, In a database system there is :, (a) large size of DBMS, (b) increased overall costs, (d) all of these, (c) increased complexity, , 1\


Page 2 :
244, , 14., , 15., , 16., , 17., , 18., , 19., , 20., , 21., , 22., , 23., , 24., , 25., , DATABASE MANAGEMENT SYSTEMS, , The DML following functional access to the database:, (a) retrieve data and/or records, (b) add (or insert) records, (c) delete records from database fIles, (d) all of these, 4 GL has the following components inbuilt in it :, (a) query languages, (b) report generators, (d) all of these, ( c) spread sheets, What separates the physical aspects of data storage from the logical aspects of data, representation?, (a) data, (b) schema, (c) constraints, (d) relationships, What schema defined how and where the data are organised in a physical data storage?, (a) external, (b) internal, (c) conceptual, (d) none of these, Which of the following schemas defined a view or views of the database for particular user?, (a) external, (b) internal, (c) conceptual, (d) none of these, A collection of data designed to be used by different people is called?, (a) database, (b) RDBMS, (c) DBMS, (d) none of these, Which of the following is a characteristics of the data in a database :, (a) shared, (b) secure, (c) independent, (d) all of these, An object oriented DBMS is capable of holding:, (a) data and text, (b) picture and images, (c) voice and video, (d) all of above, Which of the following is an object oriented feature?, (a) inheritance, (b) polymorphism, (c) abstraction, (d) all of these, Immunity of the conceptual schemas to change in the internal schemas is referred to as :, (a) physical data independence, (b) logical data independence, (c) both (a) and (b), (d) none of these, A physical data model are used to :, (a) specify overall logical structure of the database, (b) describe data and its relationship, (c) higher level description of storage structure and access mechanism, (d) all of these, An object-oriented data models are used to :, (a) specify overall logical structure of the database, (b) describe data and its relationship, (c) higher level description of storage structure and access mechanism, (d) all of these


Page 3 :
APPENDIX-B, , 26., , 27., , 28., , 29., , 30., , 31., , 32., , 33., , 34., , 35., , 36., , 37., , 38., , 39., , 245, , The relational data model was first introduced by :, (a) SPARC, (b) E.F. cord, (c) ANSI, (d) chern, The E-R data model was first introduced by :, (a) SPARC, (b) E.F. cord, (d) chern, (c) ANSI, The father of relation database system is :, (a) Pascal, (b) c.J. Date, (d) none of these, (c) Dr. Edgar F. cord, Who wrote the paper titled '~ relational model of data for large shared data banks"?, (a) F.R. McFadder, (b) C.J. Date, (c) Dr. Edgar F. cord, (d) none of these, What is the RDBMS terminology for a row?, (a) tuple, (b) relation, (d) domain, (c) attribute, What is the cardinality of a table with 1000 rows and 10 columns?, (b) 100, (a) 10, (c) 1000, (d) none of these, What is the cardinality of a table with 5000 rows and 50 columns?, (b) 50, (a) 10, (c~ 500, (d) 5000, Which of the following key in table'can uniquely identify a row in a table?, (a) primary key, (b) alternate key, (c) candidate key, (d) all of these, A table can have only one :, (a) primary key, (b) alternate key, (c) candidate key, (d) all of these, What are all candidate keys other than the primary keys called?, (a) secondary keys, (b) alternate keys, (c) eligible keys, (d) none of these, What is the name of attribute or attribute combination of one relation whose values are required, to match those of the primary key of some other relation?, (a) candidate key, (b) primary key, (c) foreign key, (d) matching key, What is the RDBMS terminology for column?, (a) tuple, (b) relation, (c) attribute, (d) domain, What is the RDBMS terminology for table?, (a) tuple, (b) relation, (c) attribute, (d) domain, What is the RDBMS terminology for legal values that an attribute can have?, (a) tuple, (b) relation, (c) attribute, (d) domain


Page 4 :
246, , 40., , 41., , 42., , 43., , 44., , 45., , 46., , 47., , 48., , 49., , 50., , DATABASE MANAGEMENT SYSTEMS, , What is the RDBMS terminology for the no. of tuples in a relation?, (a) degree, (b) relation, (c) attribute, (d) cardinality, What is the RDBMS terminology for the no. of attributes in a relation?, (a) degree, (b) relation, (c) attribute, (d) cardinality, Which of the following aspects of data is the ccncern of a relational database model?, (a) data manipulation, (b) data integrity, (d) all of these, (c) data structure, What is the smallest unit of data in the relational model?, (a) data type, (b) field, (c) data value, (d) none of the~e, A functional dependency is a :, (a) many-to-many relationship between two sets of attributes, (b) one-to-one relationship between two sets of attributes, (c) many-to-one relationship between two sets of attributes, (c) none of these, Decomposition helps in eliminating some of the problems of bad design such as :, (a) redundancy, (b) inconsistencies, (c) anomalies, (d) all of these, The word loss in lossless refers to the :, (a) loss of information, (b) loss of attributes, (c) loss of relations, (d) none of these, The set of attribute X will be fully functionally dependent on the set of attribute Y if the following, conditions are satisfied :, (a) X is functionally dependent on Y, (b) X is not functionally dependent on any subset of Y, (c) both (a) and (b), (d) none of these, ~ormalization is a process of:, (a) decomposing a set of relations, (b) successive reduction of relation schema, (c) deciding which attributes in a relation to be grouped together, (d) all of these, The normalization process was developed by :, (b) R.F. Boyce, (a) E.F. Codd, (d) Collin White, (c) R. Fagin, A normal form is :, (a) a state of relation that results from applying simple rules regarding FDs, (b) the highest normal form condition that it meets, (c) an indication of the degree to which it has been normalised, (d) all of these


Page 5 :
247, , APPENDIX-B, , 51., , 52., , 53., , 54., , 55., , 56., , 57., , 58., , 59., , Which of the following is the formal process of deciding which attributes should be grouped, together in a relation?, (a) optimization, (b) normalization, (c) tuning, (d) none of these, In 1 NF:, (a) all domains are simple, (b) in a simple domain, all elements are atomic, (c) both (a) and (b), (d) none of these, 2 NF is always in :, (a) 1 NF, (b) BCNF, (c) MVD, (d) none of these, A relation R is said to be in 2 NF :, (a) if it is in 1 NF, (b) every non-prime key attribute of R is fully functionally dependent on each relation key of R, (c) if it is in BCNF, (d) both (a) and (b), A relation R is said to be in 3 NF if the ;, (a) relation R is in 2 NF, (b) non-prime attributes are mutually independent, ( c) functionally dependent on the prime key, (d) all of these, The idea of multi-valued dependency was introduced by :, (b) R.E Boyce, (a) E.F. Codd, (c) R. Fagin, (d) none of these, The expansion of BCNF is :, (a) Boyd-Codd normal form, (b) Boyce-Ceromwell normal form, (c) Boyce-Codd normal form, (d) none of these, The 4 NF is concerned with dependencies b/w the elements of compounds keys composed of :, (a) one attribute, (b) two attribute, (d) none of these, ( c) three or more attribute, When all the columns in a relation describe and depend upon the primary key, the relation is, said to be in :, , W1NF, W3NF, 60., , 61., , 62., , ~2NF, ~4NF, , Which of the following is the activity of co-ordinating the actions of process that operate in, parallel and access shared data?, (a) transaction management, (b) recovery management, (c) concurrency control, (d) none of these, Which of the following is the ability of a DBMS to manage the various transactions that occur, within the system?, (a) transaction management, (b) recovery management, (c) concurrency control, (d) none of these, Which of following is transaction property?, (a) isolation, (b) durability, (c) atomiticity, (d) all of these


Page 6 :
248, 63., , 64., , 65., , 66., , 67., , 68., , ~9., , 70., , 71., , 72., , 73., , 74., , 75., , 76., , DATABASE MANAGEMENT SYSTEMS, , Which of the following ensures the consistency of the transactions?, (a) application programmer, (b) concurrency control, (c) recovery management, (d) transaction management, Which of the following ensures the durability of a transaction?, (a) application programmer, (b) concurrency control, (c) recovery management, (d) transaction management, In a shrinking phase, a transaction :, (a) release all tasks, tb) cannot obtain any new lock, (c) both (a) and (b), (d) none of these, Which of the following ensures the atomicity of a transaction?, (a) application programmer, (b) concurrency control, (c) recovery management, (d) transaction management, Which of the following ensures the isolation of a transaction?, (a) application programmer, (b) concurrency control, (c) recovery management, (d) transaction management, Which of the following is a transaction state?, (a) active, (b) commit, (c) aborted, (d) all of these, The concurrency control has the following problem;, (a) lost updates, (b) dirty read, (c) unrepeatable read, (d) all of these, Which of the following is a not a transaction management SQL command?, (a) commit, (b) select, (c) savepoint, (d) rollback, Which of the following is a statement after which you cannot issue a commit command?, (a) insert, (b) select, (c) update, (d) delete, Which of the following is validation-based concurrency control?, (a) validation, (b) write, (d) all of these, (c) read, Locking can take place at the following levels :, (a) page level, (b) database level, (c) row level, (d) all of these, A transaction can include following basic database access operation:, (a) read-item (X), (b) write-item (X), (c) both (a) and (b), (d) none of these, Which of the following is not a deadlock handling strategy?, (a) Timeout, (b) Deadlock annihilation, (c) Deadlock prevention, (d) Deadlock detection, In a growing phase, a transaction as acquired all the required locks :, (b) without unlocking data, (a) by locking data, (d) none of these, (c) with unlocking data


Page 7 :
APPENDIX-B, , 77., , 78., , 79., , SO., , 81., , 82., , 83., , 84., , 85., , 86., , 87., , 88., , 89., , 249, , Which of the following is an optimistic concurrency control method:, (a) validation-based, (b) time-stamp ordering, (c) lock-ba~ed, (d) none of these, The basic variations of timestamp-based methods of concurrency control are :, (a) total timestamp ordering, (b) partial timestamp ordering, (c) multiversion timestamp ordering, (d) all of these, In optimistic methods, each transaction moves through the following phases :, (a) read phase, (b) validation phase, (c) write phase, (d) all of these, Which of the following is not a recovery technique :, (a) shadow paging, (b) deferred update, (c) write-ahead logging, (d) immediate update, Which of the following are copies of physical database fIles :, (a) transaction log, (b) physical backup, (c) logical backup, (d) none of these, Which of the following failure is caused by hardware failures :, (a) operations, (b) design, (c) physical, (d) none of these, Which of the following is most dangerous type of failures :, (a) hardware, (b) network, (c) media, (d) software, Hardware failure may include :, (a) memory errors, (b) disk crashes, ( c) disk full error, (d) all of these, Software failure may include failure related to software such as :, (a) operating system, (b) DBMS software, (c) application program, (d) all of these, Which of the following is a facility provided by the DBMS to assist the recovery process:, (a) recovery manager, (b) lagging facilities, (c) backup mechanism, (d) all of these, When using a transaction log based recovery scheme, it might improve performance as well as, providing a recovery mechanism by :, (a) writing the appropriate log to disk during the transaction's execution, (b) writing the log record to disk when each transaction commits, (c) never writing the log records to disk, (d) waiting to write the log records until mUltiple transactions commit and write then as a batch, To cope with media (or disk) failures, it is necessary:, (a) to keep a redundant copy of the database, (b) to never abort a transaction, (c) for the DBMS to only execute transaction in a single user environment, (d) all of these, Shadow paging technique maintains :, (b) three page table, (a) two page table, (d) five page table, (c) four page table


Page 8 :
250, 90., , 91., , 92., , 93., , 94., , 95., , 96., , 97., , 98., , 99., , 100., , DATABASE MANAGEMENT SYSTEMS, , The checkpoint technique is used to limit :, (a) the volume of log information, (b) amount of searching, (c) subsequent processing that is needed to carryout the transaction log fIle, (d) all of these, Which of the following recovery techniques does not need logs :, (a) shadow paging, (b) immediate update, ( c) deferred update, (d) none of these, The database backup is stored in a secure place, usually;, (a) in a different building, (b) protected against danger such as fire, theft, flood, (c) other potential clamities, (d) all of these, Loss of availability means that the ;, (a) data cannot be accessed by the users, (b) system cannot be accessed by the users, (c) both data and system cannot be used by users, (d) none of these, Which of the following is the permission to access a named object in a prescribed manner ;, (a) role, (b) privilege, (c) permission, (d) all of these, Loss of data integrity means that the :, (a) data and system cannot be accessed by the users, (b) invalid and corrupted data has been generated, (c) loss of protecting or mountaining secrecy over critical data of the organization, (d) loss of protecting data from individuals, Which of the following is not a part of the database security :, (a) data, (b) hardware and software, (d) external hackers, (c) people, Discretionary access control (also called security scheme) is based on the concept of ;, (a) access rights, (b) system-wide policies, (c) both (a) and (b), (d) none of these, Loss of confidentiality means that the ;, (a) data and system cannot be accessed by the uses, (b) invalid and corrupted data has been generated, (c) loss of protecting or maintaining secrecy over critical data of the organization, (d) loss of protecting data from individuals, Loss of privacy means that the:, (a) data and system cannot be accessed by the users, (b) invalid and corrupted data has been generated, (c) loss of protecting and maintaining secrecy over critical data of the organization, (d) loss of protecting data from individuals, Legal and ethical issue one related to the:, (a) right to access of an individual user or user groups to access certain information


Page 9 :
APPENDIX-B, , 101., , 102., , 103., , 104., , 105., , 106., , 107., , 108., , 109., , 251, , (b) enforcement of various security functions at system levels, for example at physical hardware, level, at the DBMS level or at the operating system level, (c) enforcement of the security policy of the organization with respect to permitting access to, various classification of data, (d) none of these, System related issue one related to the:, (a) rights to access of an individual user or group of users to access certain information, (b) enforcement of various security functions at system level, for example at physical hardware, level, at the DBMS level or at the operating system level, (c) enforcement of the security policy of the organization with respect to permitting access to, various classification of data, (d) none of these, Which of the following is a database privilege :, (a) the right to create a table or relation, (b) the right to select rows from another user's table, (c) the right to create a session, (d) all of these, ORDBMS can handle:, (a) complex objects, (b) user dermed types, (c) abstract data type, (d) all of these, Object-relational DBMS (ORDBMS) is also called:, (a) -enhanced relational DBMS, (b) general relational DBMS, (c) object oriented DBMS, (d) all of these, Example of complex objects are :, (a) complex non-conventional data in engineering designs, (b) complex non-conventional data in the biological genome information, (c) complex non-conventional data in architectural drawing, (d) all of these, An ORDBMS product developed by ORACLE is known as:, (a) universal database, (b) postgres, (c) informix, (d) None of these, A distributed database system allows application to access data from :, (a) local database, (b) remote database, ( c) both local and remote database, (d) none of these, In homogeneous DDBS :, (a) there are several sites, each running their own application on the same DBMS software, (b) all sites have identical DBMS software, (c) all users (or client) use identical software, (d) all of these, In heterogeneous DDBS :, (a) different sites run under the control of different DBMSs, essentially autonomously, (b) different sites are connected somehow to enable access to data from multiple sites, (c) different sites may use different schemas and different DBMS, (d) all of these


Page 10 :
252, , DATABASE MANAGEMENT SYSTEMS, , 110. The main component of the client/server architecture:, , 111., , 112., , 113., , 114., , 115., , 116., , 117., , 118., , 119., , 120., , (a) communication networks, (b) server, (c) application software, (d) all of these, Which of the following is not benefit of client/server architecture:, (b) adaptability, (a) reduction in operating cost, (c) plateform independence, (d) none of these, Which of the following are the component of DDBS :, (a) communication network, (b) server, (c) client, (d) all of these, Which of the computing architecture is used by DDBS :, (a) client/server computing, (b) mainframe computing, (d) personal computing, (d) none of these, In collaborating server architecture:, (a) there are several database servers, (b) each server is capable of running transactions against local data, (c) transactions are executed spanning mUltiple servers, (d) all of these, Data fragmentation is a :, (a) technique of breaking up the database into logical units, which may be assigned for storage, at the various sites, (b) process of deciding about locating (or placing) data to server sites, (c) technique that permit storage of certain data in move than one sites, (d) none of these, A horizontal fragmentation is produced by specifying :, (a) predicate operation of relational algebra, (b) projection operation of relational algebra, (c) selection and projection operation of relational algebra, (d) none of these, A vertical fragmentation is produced by specifying a :, (a) predicate operation of relational algebra, (b) projection operation of relational algebra, (c) selection and projection operational relational algebra, (d) none of these, In distributed query processing, semijoin operation is used to :, (a) reduce the size of a relation that needs to be transmitted, (b) reduced the communication cost, (c) both (a) and (b), (d) none of these, In DDBS the lock manager function is :, (a) distributed over several sites, (b) centralised at one site, (d) none of.these, (c) no lock manager is used, In distributed system, the detection of a deadlock requires the generation of :, (a) local wait for graph, (b) global wait for graph, (c) both (a) and (b), (d) none of these


Page 11 :
253, , APPENDIX-S, , 121. In distributed database system, the deadlock prevention method by aborting the transaction can, be used such as :, (a) timestamping, (b) wait-die method, (c) wound-wait method, (d) all of these, 122. Which of the following is the function of a distributed DBMS:, (a) distributed data recovery, (b) distributed query processing, (c) replicated data management, (d) all of these, ANSWERS, , 1. (a), , 2. (a), , 3. (d), , 4. (c), , 5. (d), , 7. (b), , 8. (d), , 13. (d), , 14. (d), , 9. (d), 15. (d), , 10 (d), 16. (a), , 11 (d), 17. (b), , 19. (a), , 20. (d), , 21. (d), , 25. (b), , 26. (b), , 27. (d), , 22. (d), 28. (c), , 23. (a), 29. (c), , 31., 37., 43., 49., 55., , 32., 38., 44., 50., 56., 62., , (d), (b), (c), (d), (c), (d), , 33., 39., 45., 51., 57., , 34., 40., 46., 52., 58., , 35., 41., 47., 53., , 63. (b), , (d), (c), (c), (d), , 69. (d), 75. (b), 81. (b), , 85. (d), , 68., 74., 80., 86., , 91. (d), , 92. (d), , (c), (c), (b), (a), (d), , 61. (b), 67. (b), 73. (d), 79. (d), , 97., 103., 109., 115., 121., , (a), (d), (d), (a), (d), , 98., 104., 110., 116., 122., , (c), (a), (d), (a), (d), , (d), (d), (d), (b), (c), , 87. (a), 93., 99., 105., 111., 117., , (a), (d), (d), (d), (b), , 18. (a), 24. (d), 30. (a), , 59. (b), , 36., 42., 48., 54., 60., , 64. (c), , 65. (c), , 66. (c), , 70. (c), , 71. (b), , 72. (d), , 76. (b), 82. (b, c), , 77. (a), 83. (c), , 78. (d), 84. (d), , 88. (a), 94. (b), , 89. (a), , 90. (a), , 100., 106., 112., 118., , (a), (d), (a), (c), (c), , 6. (d), 12 (d), , (a), (d), (d), (c), , 95., 101., 107., 113., 119., , (d), (a), (c), (a), , (b), (b), (c), (a), (a), , 96., 102., 108., 114., 120., , (c), (d), (d), (d), (a), , (c), (d), (d), (d), (c), , STATE TRUE/FALSE, , 1., 2., 3., 4., , 5., 6., , 7., 8., , Data is also called metadata., Data is a piece of fact, Data are distinct pieces of information., In DBMS, data files are the files that store the database information., The external schema defines how and where the data are organised in a physical data storage., A collection of data designed for use by different users is called a database., In a databas.e, data integrity can be maintained., The data in a database cannot be shared.