Deck 10: Transaction Management and Concurrency Control

ملء الشاشة (f)
exit full mode
سؤال
In a page-level lock,the DBMS will lock an entire diskpage.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A scheduler facilitates data isolation to ensure that two transactions do not update the same data element at the same time.
سؤال
Incomplete or improper transactions can have a devastating effect on database integrity.
سؤال
A lock guarantees the open use of a data item to multiple transactions.
سؤال
Timestamps must only have the single property of uniqueness.
سؤال
A shared lock produces no conflict as long as all the concurrent transactions are read-write only.
سؤال
Time stamping demands a lot of system resources because many transactions might have to be stopped,rescheduled,and stamped.
سؤال
The scheduler establishes the order in which the operations within concurrent transactions are executed.
سؤال
Durability requires that all portions of the transaction must be treated as a single,logical unit of work in which all operations are applied and completed to produce a consistent database.
سؤال
Atomicity indicates the permanence of the database's consistent state.
سؤال
Serializability means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
سؤال
A growing phase in a two-phase lock is when a transaction acquires all the required locks without locking any data.
سؤال
Most real-world database transactions are formed by only one database request.
سؤال
The phenomenon of uncommitted data occurs when two transactions are executed concurrently and the first transaction is rolled back after the second transaction has already accessed the uncommitted data-thus violating the isolation property of transactions.
سؤال
The DBMS guarantees that the semantic meaning of a transaction truly represents the real-world event.
سؤال
An optimistic approach is based on the assumption that the majority of the database operations do not conflict.
سؤال
Although the DBMS is designed to recover a database to a previous consistent state when an interruption prevents the completion of a required set of transactions,the transactions themselves are defined by the end user or programmer and must be semantically correct.
سؤال
The multiuser DBMS must implement controls to ensure serializability and isolation of transactions,in addition to atomicity and durability,in order to guard the database's consistency and integrity.
سؤال
A field-level lock allows concurrent transactions to access the same row,as long as they require the use of different fields within that row.
سؤال
When using an optimistic approach,during the read phase,a transaction reads the database,executes the needed computations,and makes the updates to a private copy of the database values.
سؤال
requires that all operations of a transaction be completed.

A)Specificity
B)Atomicity
C)Durability
D)Time stamping
سؤال
means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.

A)Serializability
B)Atomicity
C)Isolation
D)Time stamping
سؤال
ANSI defines four events that signal the end of a transaction.Of the following events,which is defined by ANSI as being equivalent to a ROLLBACK?

A)Five SQL statements are executed.
B)The end of a program is successfully reached.
C)The program is abnormally terminated.
D)The database is shut down for maintenance.
سؤال
The ANSI has defined standards that govern SQL database transactions.Transaction support is provided by two SQL statements: and ROLLBACK.

A)RETRIEVE
B)ASSIGN
C)UPDATE
D)COMMIT
سؤال
A transaction is a unit of work that must be either entirely completed or aborted.

A)timed
B)practical
C)logical
D)physical
سؤال
The reason for the different levels of isolation is to increase transaction concurrency.
سؤال
The______ manager is responsible for assigning and policing the locks used by the transactions.

A)transaction
B)database
C)lock
D)schedule
سؤال
The serializable isolation level is the least restrictive level defined by the ANSI SQL standard.
سؤال
A single-user database system automatically ensures of the database,because only one transaction is executed at a time.

A)serializability and durability
B)atomicity and isolation
C)serializability and isolation
D)atomicity and serializability
سؤال
The last step in the write-through technique recovery procedure is to identify the last checkpoint in the transaction log.
سؤال
are required to prevent another transaction from reading inconsistent data.

A)Locks
B)Schedules
C)Stamps
D)Logs
سؤال
As long as two transactions,T1 and T2,access data,there is no conflict,and the order of execution is irrelevant to the final outcome.

A)shared
B)common
C)unrelated
D)locked
سؤال
The transaction recovery write-ahead-log protocol ensures that transaction logs are always written before any database data are actually updated.
سؤال
Lock indicates the level of lock use.

A)granularity
B)shrinking
C)growing
D)serializability
سؤال
A consistent database state is .

A)one in which all tables have foreign keys
B)one in which all data integrity constraints are satisfied
C)one in which all tables are normalized
D)one in which all SQL statements only update one table at a time
سؤال
occurs when a transaction accesses data before and after one or more other transactions finish working with such data.

A)Inconsistent retrievals
B)The phenomena of uncommitted data
C)Lost update problems
D)Dirty read problems
سؤال
The information stored in the is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement,a program's abnormal termination,or a system failure such as a network discrepancy or a disk crash.

A)data dictionary
B)metadata
C)rollback manager
D)transaction log
سؤال
One of the three most common data integrity and consistency problems is .

A)lost updates
B)disk failures
C)user errors
D)deadlocks
سؤال
The implicit beginning of a transaction is .

A)when the database is started
B)when a table is accessed for the first time
C)when the first SQL statement is encountered
D)when the COMMIT command is issued
سؤال
ANSI defines four events that signal the end of a transaction.Of the following events,which is defined by ANSI as being equivalent to a COMMIT?

A)Five SQL statements are executed.
B)The end of a program is successfully reached.
C)The program is abnormally terminated.
D)The database is shut down for maintenance.
سؤال
A diskpage,or page,is the equivalent of a .

A)database table
B)disk sector
C)database schema
D)diskblock
سؤال
A lock allows concurrent transactions to access different rows of the same table.

A)database-level
B)table-level
C)page-level
D)row-level
سؤال
The .occurs when two concurrent transactions,T1 and T2,are updating the same data element and one of the updates is lost.
سؤال
A(n)specifically reserves access to the transaction that locked the object.

A)shared lock
B)exclusive lock
C)binary lock
D)deadlock
سؤال
The scheduler's main job is to create a(n)of a transaction's operation,in which the interleaved executions of transactions yield the same results as if the transactions were executed in serial order.
سؤال
The approach to scheduling concurrent transactions assigns a global unique stamp to each transaction.

A)scheduled
B)table-locking
C)unique
D)timestamping
سؤال
What is a rule that applies to the two-phase locking protocol?

A)Two transactions cannot have conflicting locks.
B)No unlock operation can precede a lock operation in a different transaction.
C)No data is affected until all locks are released.
D)No data is affected until the transaction is in its locked position.
سؤال
The objective of control is to ensure the serializability of transactions in a multiuser database environment.
سؤال
A lock locks the entire diskpage.

A)transaction-level
B)table-level
C)page-level
D)row-level
سؤال
A(n)condition occurs when two or more transactions wait for each other to unlock data.

A)deadlock
B)exclusive lock
C)binary lock
D)two-phase lock
سؤال
If a(n)is issued before the termination of a transaction,the DBMS will restore the database only for that particular transaction,rather than for all transactions,in order to maintain the durability of the previous transactions.
سؤال
A lock locks the entire table preventing access to any row by a transaction while another transaction is using the table.

A)database-level
B)table-level
C)page-level
D)row-level
سؤال
In the wait/die scheme,:

A)the older transaction rolls back the younger transaction and reschedules it.
B)the younger,preempted transaction is rescheduled using the same time stamp.
C)the older transaction waits for the younger one to complete and release its locks.
D)both the younger and older transactions wait indefinitely to be released.
سؤال
A(n)phase in a two-phase lock is when a transaction releases all locks and cannot obtain any new lock.

A)growing
B)shrinking
C)locking
D)unlocking
سؤال
Although the DBMS is designed to recover a database to a previous consistent state when an interruption prevents the completion of a required set of transactions,the transactions themselves are defined by the end user or programmer and must be._________correct.
سؤال
A(n)occurs when a transaction executes a query at time t1,and then it runs the same query at time t2,yielding additional rows that satisfy the query.

A)phantom read
B)dirty read
C)uncommitted dependency
D)nonrepeatable read
سؤال
The isolation level ensures that queries return consistent results.
a.Read Uncommitted
b.Read Committed
c.Serializable
d.Repeatable Read
سؤال
In the optimistic approach,during the phase,a transaction scans the database,executes the needed computations,and makes the updates to a private copy of the database values.

A)read
B)validation
C)write
D)shared
سؤال
A(n)lock exists when concurrent transactions are granted read access on the basis of a common lock.

A)shared
B)exclusive
C)binary
D)two-phase
سؤال
In the optimistic approach,during the phase,changes are permanently applied to the database.
a.read
b.validation
c.write
d.shared
سؤال
ensure that a disk physical failure will not impair the DBMS's ability to recover data.
سؤال
What is transaction isolation and why it is important?
سؤال
The interleaves the execution of database operations to ensure serializability.
سؤال
What are database checkpoints?
سؤال
-level locks are less restrictive than database-level locks,but they create traffic jams when many transactions are waiting to access the same table.
سؤال
If T1 has not unlocked data item Y,T2 cannot begin; if T2 has not unlocked data item X,T1 cannot continue.Consequently,T1 and T2 each wait for the other to unlock the required data item.Such a deadlock is also known as a(n)_____.
سؤال
Uniqueness ensures that no equal time stamp values can exist,and ensures that time stamp values always increase.
سؤال
can take place at any of the following levels: database,table,page,row,or field.
سؤال
Database transaction restores a database from an inconsistent state to a previously consistent state.
سؤال
To determine the appropriate order of the operations,the scheduler bases its actions on concurrency control algorithms,such as or time stamping methods.
سؤال
Explain the transaction log.What is its function?
سؤال
Most multiuser automatically initiate and enforce locking procedures,where all locking information is managed by the lock manager.
سؤال
In a heavily used database management system (DBMS),the prevention and detection of constitutes an important DBMS function.
سؤال
How does a shared/exclusive lock schema increase the lock manager's overhead?
سؤال
The rule states that only one transaction at a time can own an exclusive lock on the same object.
سؤال
As a rule,a(n)must unlock the object after its termination.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/76
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Transaction Management and Concurrency Control
1
In a page-level lock,the DBMS will lock an entire diskpage.
True
2
A scheduler facilitates data isolation to ensure that two transactions do not update the same data element at the same time.
True
3
Incomplete or improper transactions can have a devastating effect on database integrity.
True
4
A lock guarantees the open use of a data item to multiple transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
5
Timestamps must only have the single property of uniqueness.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
6
A shared lock produces no conflict as long as all the concurrent transactions are read-write only.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
7
Time stamping demands a lot of system resources because many transactions might have to be stopped,rescheduled,and stamped.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
8
The scheduler establishes the order in which the operations within concurrent transactions are executed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
9
Durability requires that all portions of the transaction must be treated as a single,logical unit of work in which all operations are applied and completed to produce a consistent database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
10
Atomicity indicates the permanence of the database's consistent state.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
11
Serializability means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
12
A growing phase in a two-phase lock is when a transaction acquires all the required locks without locking any data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
13
Most real-world database transactions are formed by only one database request.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
14
The phenomenon of uncommitted data occurs when two transactions are executed concurrently and the first transaction is rolled back after the second transaction has already accessed the uncommitted data-thus violating the isolation property of transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
15
The DBMS guarantees that the semantic meaning of a transaction truly represents the real-world event.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
16
An optimistic approach is based on the assumption that the majority of the database operations do not conflict.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
17
Although the DBMS is designed to recover a database to a previous consistent state when an interruption prevents the completion of a required set of transactions,the transactions themselves are defined by the end user or programmer and must be semantically correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
18
The multiuser DBMS must implement controls to ensure serializability and isolation of transactions,in addition to atomicity and durability,in order to guard the database's consistency and integrity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
19
A field-level lock allows concurrent transactions to access the same row,as long as they require the use of different fields within that row.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
20
When using an optimistic approach,during the read phase,a transaction reads the database,executes the needed computations,and makes the updates to a private copy of the database values.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
21
requires that all operations of a transaction be completed.

A)Specificity
B)Atomicity
C)Durability
D)Time stamping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
22
means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.

A)Serializability
B)Atomicity
C)Isolation
D)Time stamping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
23
ANSI defines four events that signal the end of a transaction.Of the following events,which is defined by ANSI as being equivalent to a ROLLBACK?

A)Five SQL statements are executed.
B)The end of a program is successfully reached.
C)The program is abnormally terminated.
D)The database is shut down for maintenance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
24
The ANSI has defined standards that govern SQL database transactions.Transaction support is provided by two SQL statements: and ROLLBACK.

A)RETRIEVE
B)ASSIGN
C)UPDATE
D)COMMIT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
25
A transaction is a unit of work that must be either entirely completed or aborted.

A)timed
B)practical
C)logical
D)physical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
26
The reason for the different levels of isolation is to increase transaction concurrency.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
27
The______ manager is responsible for assigning and policing the locks used by the transactions.

A)transaction
B)database
C)lock
D)schedule
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
28
The serializable isolation level is the least restrictive level defined by the ANSI SQL standard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
29
A single-user database system automatically ensures of the database,because only one transaction is executed at a time.

A)serializability and durability
B)atomicity and isolation
C)serializability and isolation
D)atomicity and serializability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
30
The last step in the write-through technique recovery procedure is to identify the last checkpoint in the transaction log.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
31
are required to prevent another transaction from reading inconsistent data.

A)Locks
B)Schedules
C)Stamps
D)Logs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
32
As long as two transactions,T1 and T2,access data,there is no conflict,and the order of execution is irrelevant to the final outcome.

A)shared
B)common
C)unrelated
D)locked
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
33
The transaction recovery write-ahead-log protocol ensures that transaction logs are always written before any database data are actually updated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
34
Lock indicates the level of lock use.

A)granularity
B)shrinking
C)growing
D)serializability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
35
A consistent database state is .

A)one in which all tables have foreign keys
B)one in which all data integrity constraints are satisfied
C)one in which all tables are normalized
D)one in which all SQL statements only update one table at a time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
36
occurs when a transaction accesses data before and after one or more other transactions finish working with such data.

A)Inconsistent retrievals
B)The phenomena of uncommitted data
C)Lost update problems
D)Dirty read problems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
37
The information stored in the is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement,a program's abnormal termination,or a system failure such as a network discrepancy or a disk crash.

A)data dictionary
B)metadata
C)rollback manager
D)transaction log
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
38
One of the three most common data integrity and consistency problems is .

A)lost updates
B)disk failures
C)user errors
D)deadlocks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
39
The implicit beginning of a transaction is .

A)when the database is started
B)when a table is accessed for the first time
C)when the first SQL statement is encountered
D)when the COMMIT command is issued
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
40
ANSI defines four events that signal the end of a transaction.Of the following events,which is defined by ANSI as being equivalent to a COMMIT?

A)Five SQL statements are executed.
B)The end of a program is successfully reached.
C)The program is abnormally terminated.
D)The database is shut down for maintenance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
41
A diskpage,or page,is the equivalent of a .

A)database table
B)disk sector
C)database schema
D)diskblock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
42
A lock allows concurrent transactions to access different rows of the same table.

A)database-level
B)table-level
C)page-level
D)row-level
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
43
The .occurs when two concurrent transactions,T1 and T2,are updating the same data element and one of the updates is lost.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
44
A(n)specifically reserves access to the transaction that locked the object.

A)shared lock
B)exclusive lock
C)binary lock
D)deadlock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
45
The scheduler's main job is to create a(n)of a transaction's operation,in which the interleaved executions of transactions yield the same results as if the transactions were executed in serial order.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
46
The approach to scheduling concurrent transactions assigns a global unique stamp to each transaction.

A)scheduled
B)table-locking
C)unique
D)timestamping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
47
What is a rule that applies to the two-phase locking protocol?

A)Two transactions cannot have conflicting locks.
B)No unlock operation can precede a lock operation in a different transaction.
C)No data is affected until all locks are released.
D)No data is affected until the transaction is in its locked position.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
48
The objective of control is to ensure the serializability of transactions in a multiuser database environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
49
A lock locks the entire diskpage.

A)transaction-level
B)table-level
C)page-level
D)row-level
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
50
A(n)condition occurs when two or more transactions wait for each other to unlock data.

A)deadlock
B)exclusive lock
C)binary lock
D)two-phase lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
51
If a(n)is issued before the termination of a transaction,the DBMS will restore the database only for that particular transaction,rather than for all transactions,in order to maintain the durability of the previous transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
52
A lock locks the entire table preventing access to any row by a transaction while another transaction is using the table.

A)database-level
B)table-level
C)page-level
D)row-level
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
53
In the wait/die scheme,:

A)the older transaction rolls back the younger transaction and reschedules it.
B)the younger,preempted transaction is rescheduled using the same time stamp.
C)the older transaction waits for the younger one to complete and release its locks.
D)both the younger and older transactions wait indefinitely to be released.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
54
A(n)phase in a two-phase lock is when a transaction releases all locks and cannot obtain any new lock.

A)growing
B)shrinking
C)locking
D)unlocking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
55
Although the DBMS is designed to recover a database to a previous consistent state when an interruption prevents the completion of a required set of transactions,the transactions themselves are defined by the end user or programmer and must be._________correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
56
A(n)occurs when a transaction executes a query at time t1,and then it runs the same query at time t2,yielding additional rows that satisfy the query.

A)phantom read
B)dirty read
C)uncommitted dependency
D)nonrepeatable read
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
57
The isolation level ensures that queries return consistent results.
a.Read Uncommitted
b.Read Committed
c.Serializable
d.Repeatable Read
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
58
In the optimistic approach,during the phase,a transaction scans the database,executes the needed computations,and makes the updates to a private copy of the database values.

A)read
B)validation
C)write
D)shared
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
59
A(n)lock exists when concurrent transactions are granted read access on the basis of a common lock.

A)shared
B)exclusive
C)binary
D)two-phase
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
60
In the optimistic approach,during the phase,changes are permanently applied to the database.
a.read
b.validation
c.write
d.shared
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
61
ensure that a disk physical failure will not impair the DBMS's ability to recover data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
62
What is transaction isolation and why it is important?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
63
The interleaves the execution of database operations to ensure serializability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
64
What are database checkpoints?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
65
-level locks are less restrictive than database-level locks,but they create traffic jams when many transactions are waiting to access the same table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
66
If T1 has not unlocked data item Y,T2 cannot begin; if T2 has not unlocked data item X,T1 cannot continue.Consequently,T1 and T2 each wait for the other to unlock the required data item.Such a deadlock is also known as a(n)_____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
67
Uniqueness ensures that no equal time stamp values can exist,and ensures that time stamp values always increase.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
68
can take place at any of the following levels: database,table,page,row,or field.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
69
Database transaction restores a database from an inconsistent state to a previously consistent state.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
70
To determine the appropriate order of the operations,the scheduler bases its actions on concurrency control algorithms,such as or time stamping methods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
71
Explain the transaction log.What is its function?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
72
Most multiuser automatically initiate and enforce locking procedures,where all locking information is managed by the lock manager.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
73
In a heavily used database management system (DBMS),the prevention and detection of constitutes an important DBMS function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
74
How does a shared/exclusive lock schema increase the lock manager's overhead?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
75
The rule states that only one transaction at a time can own an exclusive lock on the same object.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
76
As a rule,a(n)must unlock the object after its termination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 76 في هذه المجموعة.