This set of MCQs helps students to learn about the concepts of concurrency control concept that comes under the transaction .database management system (DBMS). It is a procedure in DBMS which helps us for the management of two simultaneous processes to execute without conflicts between each other, these conflicts occur in multi-user systems.
Which of the following is not a restriction for a table to be a relation?
A relation in this form is free of all modification anomalies.
In order to maintain transactional integrity and database consistency, what technology does a DBMS deploy?
Which of the following are introduced to reduce the overheads caused by the log-based recovery?
Which of the following protocols ensures conflict serializability and safety from deadlocks?
Which of the following is the block that is not permitted to be written back to the disk?
If transaction Ti gets an explicit lock on the file Fc in exclusive mode, then it has an __________ on all the records belonging to that file.
All lock information is managed by a __________ which is responsible for assigning and policing the locks used by the transactions.
The ____ lock allows concurrent transactions to access the same row as long as they require the use of different fields within that row.
Which of the following is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released?
For some relations, changing the data can have undesirable consequences called:
Referential integrity constraints.
Modification anomalies.
Normal forms.
Transitive dependencies.
A key:
Must always be composed of two or more columns.
Can only be one column.
Identifies a row.
Identifies a column.
An attribute is a(n):
Column of a table.
Two dimensional table.
Row of a table.
Key of a table.
A lock that allows concurrent transactions to access different rows of the same table is known as a,
Database-level lock
Table-level lock
Page-level lock
Row-level lock
This refers to a property of computer to run several operations simultaneously and possible as computers await the response of each other.
Concurrency
Deadlock
Backup
Recovery