1. The developer used ____________SQL statements in the creation of the transaction database.
One
2. A transaction is a logical unit of work that must be entirely completed or removed.
True
3. The DBMS guarantees that the semantic meaning of a transaction truly represents the real-world event.
False
4. The pet store where you work has transactions that have been processed. The database shows a permanent consistent state. The _________________ transaction property indicates the permanence of the database’s consistent state.
Atomicity
5. Serializability means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
False
6. Durability requires that all portions of the transaction must be treated as a single, logical unit of work in which all operations are applied and completed to produce a consistent database.
False
7. A developer is creating a multi-user database to process transactions. The database’s consistency and integrity of the transactions are guarded using _____________ and ____________ in addition to atomicity and durability.
Serializability, Isolation
8. The database in the pet store where you work has two transactions that are being executed concurrently. The first transaction is rolled back after the second transaction has already accessed the uncommitted data. These transactions violated the _____________________ property of transactions.
Isolation
9. The concurrent transaction operations order is executed by the Time Stamp.
False
10. The pet store database where you work wants to facilitate data isolation to ensure that two transactions do not update at the same time. The developer will utilize the ____________ to make sure that two transactions do not update the same data at the same time.
Scheduler
11. When you design a multi-user database the open use of a data items to multiple transactions is guaranteed by a ________________ in the DBMS.
lock
12. In a page-level lock, the DBMS will lock an entire diskpage.
True
13. You are designing a multi-user database which allows concurrent transactions to access the same row as long as they require the use of different fields within that row. You will utilize the _________ lock to ensure that different fields within the same row are accessed.
field-level
14. The process of recovering a database to previous consistent state is database recovery.
True
15. A process that ensures a database is immediately updated by operations during the transaction, even before the transaction commit point is called write-through update.
False
16. Time stamps must only have the single property of uniqueness.
False
17. Your database has become slow which has caused many transactions to be stopped, rescheduled, and restamped. There are increased memory needs along with database processing overhead that is caused by the ____________ of the transactions.
Time-stamping
18. An optimistic approach is based on the assumption that the majority of the database operations do not conflict.
True
19. During the read phase, a transaction reads the database, executes the needed computations, and makes the updates to a private copy of the database values during the ________________.
Optimistic Approach
20. You are creating a database and want to use the least restrictive isolation level for transactions as defined by the ANSI SQL. Which Isolation level would you use that allows transactions to read uncommitted data from other transactions, along with nonrepeatable and fantom reads?
Read Uncommitted
21. You are tasked with building a muti-user database which will record transactions. Transactions in this database are a _________ unit of work that must be either entirely completed or aborted.
logical
22. When you design a multi-user database, it is best to have a consistent database state is one in which all ___________________.
data integrity constraints are satisfied
23. When designing the multi-user database, the _________ transaction property requires that all operations of a transaction be completed.
Atomicity
24. _____ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
Isolation
25. You develop a single-user database system that only one transaction is executed at a time. These two isolation properties automatically ensure the integrity of the database.
serializability and isolation
26. When creating a multi-user database ANSI has defined standards that govern SQL database transactions. There are two SQL statements __________________ and ROLLBACK that are utilized in transaction support.
COMMIT
27. The pet store where you work utilizes a multi-user database where ______________ is known as coordinating the simultaneous execution of transactions.
concurrency control
28. When designing a multi-user database, you want to use ANSI defined events that are equivalent to a ROLLBACK. Which of the following are the events that you would utilize?
All changes are aborted and returned to a previous consistent state.
29. The implicit beginning of a transaction is when _____.
the first SQL statement is encountered
30. The database for the pet store where you work has one transaction that is not committed, and a second transaction is executed. This is called:
lost update
31. One of the three most common data integrity and consistency problems is _____.
lost updates
32. _____ occurs when a transaction accesses data before and after one or more other transactions finish working with such data.
Inconsistent retrieval
33. Lock granularity indicates the level of lock use which can take place at which levels:
database, table, page, row, or field (attribute)
34. _____ are required to prevent another transaction from reading inconsistent data.
Locks
35. The _____ manager is responsible for assigning and policing the locks used by transactions.
lock
36. The lock level of use is indicated by the lock _________.
granularity
37. The developer creates a multi-user database and uses a _________ lock to prevent access to any row in a table while another transaction is using the table.
table-level
38. When creating a multi-user database, you will set a _________ on the entire table so that it is locked, preventing access to transaction 1 by transaction 2 while transaction 1 is accessing the table.
page-level
39. The database in the store where you work is having trouble with the transactions. The database transaction recovery uses data in the transaction log to recover the data to a consistent state. This recovery process has four important concepts which affect it:
write-ahead-log protocol, redundant transaction logs, buffers, checkpoints
40. You are creating a transaction management database and the currency control called __________ ensures that database operations do not conflict.
optimistic approach
41. You decide to use the optimistic approach for the multi-user database you are creating. Each transaction moves through two or three of these phases ______ , _______, and ________ using this approach.
read, validation, write
42. The three types of “reads” that a transaction allows or does not allow in transaction levels are __________, _________ and _________.
dirty read, non-repeatable read, phantom read
43. The database in a store where you work reads a row in T1 at the same time it reads a row at T2 producing different results because T1 has not been updated this is called_____________.
non repeatable read
44. The pet store has T1 which occurs at 3:45pm while T2 & T3 occur at 5:00pm to 6:00pm. The system crashes at 6:45pm during T4. You perform recovery _________ to restore the data that occurred before T4.
rollback
45. Database recovery restores the database from current state to previous state which is triggered by a critical error caused by ___________ or ____________.
hardware error, software error
46. When designing the multi-user database for a grocery store you decide to use the ___________ approach to scheduling concurrent transactions that assigns a global unique stamp to each transaction.
time stamping
47. In the wait/die scheme of concurrency control, the ______
older transaction waits for the younger one to complete and release its locks.
48. You decide to use the optimistic approach when designing the database for a store. A transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values during the __________ phase of the optimistic approach.
read
49. In the optimistic approach, during the _____ phase, changes are permanently applied to the database.
write
50. You decide to use the _________ isolation level which ensures that queries return consistent results.
repeatable read
51. When a database uses a _________________, the database is immediately updated by transaction operations during the transaction’s execution.
write-through technique
52. The recovery process uses the _______________________ which the transaction operations do not update the physical database immediately.
deferred- write technique
53. You decide to use the most restrictive level defined by the ANSI SQL standard though deadlocks are possible. Which level are you utilizing in your database?
serializable
54. You have decided to use the lock which defines how transactions acquire and relinquish locks which guarantee serializability but do not prevent deadlocks. Which lock have you decided to use on your database?
Two-Phase Locking (2PL)
55. The database in the grocery has T1 transaction that is read and the database reads the same row T2 at the same time producing different results, this is a result of ______________________.
non repeatable read
56. You decide to use the __________________ phase of the optimistic approach in the concurrency method to validate the transaction to ensure that the changes made will not affect the integrity and consistency of the database.
validation phase
57. Recovery techniques are based on the ___________________ : all portions of the transaction must be treated as a single, logical unit of work in which all operations are applied and completed to produce a consistent database.
atomic transaction property
58. Most multi-user _____ automatically initiate and enforce locking procedures, where all locking information is managed by the lock manager.
DBMSs
59. Critical events can render a database useless, there are three types of critical events __________, ____________, and ___________,
hardware/software failure, human-caused incidents, natural disasters
60. Temporary storage area in primary memory used to speed up disk operation in transaction management is _________________.
Buffer
61. These multiple copies of the transaction log called _______________ are kept by database management systems to ensure that the physical failure of a disk will not impair the DBMS’s ability to recover data.
redundant transaction logs
62. Database __________________ are an operation in which the database management system writes all of its updated buffers to disk, while this is happening DBMS does not execute any new requests.
checkpoint
63. When a transaction ends before the commit point, then no ___________________ needs to be done to restore the database to a consistent state when using the deferred- write technique.
Rollback
64. You decide to use database transaction recovery for data in the transaction log to recover a database from an inconsistent state to a consistent state which include these four concepts ___________,___________ ,______________ and ______________.
write-ahead log protocol, redundant transaction logs, buffer, checkpoint
65. Uniqueness ensures that no equal time stamp values can exist, and _____ ensures that time stamp values always increase.
monotonicity
66. events are severe in nature caused by an end-user which include deleting
the wrong rows from a table, pressing the wrong key on the keyboard, or shutting down the main database server by accident.
human-caused incidents
67. _____ ensure that a disk physical failure will not impair the DBMS’s ability to recover data.
redundant transaction logs
68. Database transaction _____ restores a database from an inconsistent state to a previously consistent state.
recovery
69. You review the database and find that a(n) ______ occurred when a transaction executed a query at time T1, and it ran the same query at same time T2, yielding additional rows that satisfy the query.
phantom read
70. The DBMS uses the information stored in the _____ log for a recovery requirement triggered by a ROLLBACK statement, a program’s abnormal termination, or a system failure such as a network discrepancy or a disk crash.
transaction
71. The _____ protocol ensures that transaction logs are always written before any database data is actually updated.
write-ahead-log
Other Links:
See other websites for quiz:
Check on QUIZLET