0% found this document useful (0 votes)
17 views4 pages

Cse+dbms Unit V

The document covers various topics related to recovery systems, including failure classification, recovery techniques, and database management concepts such as web databases, distributed databases, and data mining. It includes a series of questions and options related to recovery measures, distributed databases, data mining tasks, and SQL authorization mechanisms. The content aims to assess knowledge on data security and recovery strategies in database systems.

Uploaded by

Aniket Kumre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views4 pages

Cse+dbms Unit V

The document covers various topics related to recovery systems, including failure classification, recovery techniques, and database management concepts such as web databases, distributed databases, and data mining. It includes a series of questions and options related to recovery measures, distributed databases, data mining tasks, and SQL authorization mechanisms. The content aims to assess knowledge on data security and recovery strategies in database systems.

Uploaded by

Aniket Kumre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Recovery System: failure classification, recovery and atomicity, log based recovery,

checkpoints, buffer management, advanced recovery techniques. Introduction to Web


databases, distributed databases, data warehousing and data mining, Data Security

Sr. No. Question Options Answer


1. Which of the following is a. Deferred update c.Two-phase
not a recovery technique? b. Immediate update commit
c. Two-phase commit
d. Recovery management
2. Checkpoints are a part of a. Recovery measures a. Recovery
b. Security measures measures
c. Concurrency measures
d. Authorization measures
3. Before a block of data in a. Read-write logging c. Write-ahead
main memory can be b. Read-ahead logging logging
output to the database, all c. Write-ahead logging
log records pertaining to d. None of the mentioned
data in that block must
have been output to
stable storage. This is
___
4. Writing the buffered log a. Memory d. Disk
to __________ is b. Backup
sometimes referred to as c. Redo memory
a log force. d. Disk
5. The a. Latches c. Dirty Block
__________________ b. Swap Space
contains a list of blocks c. Dirty Block
that have been updated in d. None of the mentioned
the database buffer.
6. A distributed database is a. A single logical database a. A single
which of the following? that is spread to multiple logical
locations and is database that
interconnected by a network is spread to
b. A loose collection of file multiple
that is spread to multiple locations and
locations and is is
interconnected by a network interconnected
c. A single logical database by a network
that is limited to one
location.
d. A loose collection of file
that is limited to one
location.
7. Which of the following is a. Reduced network traffic c. Each site
a disadvantage of b. If the database fails at one must have the
replication? site, a copy can be located same storage
at another site. capacity
c. Each site must have the
same storage capacity.
d. Each transaction may
proceed without
coordination across the
network.
8. A distributed database a. Totally centralized at one d. All of the
can use which of the location and accessed by above
following strategies? many sites
b. Partially or totally
replicated across sites
c. Partitioned into segments at
different sites
d. All of the above

9. In a data mining task a. Perform all possible data d. Allow


when it is not clear about mining tasks interaction
what type of patterns b. Handle different with the user
could be interesting, the granularities of data and to guide the
data mining system patterns mining
should: c. Perform both descriptive process
and predictive tasks
d. Allow interaction with the
user to guide the mining
process
10. To detect fraudulent a. Feature selection c. Outlier
usage of credit cards, the b. Prediction analysis
following data mining c. Outlier analysis
task should be used: d. All of the above
11. In high dimensional a. It becomes difficult to a. It becomes
spaces, the distance distinguish between the difficult to
between data points nearest and farthest distinguish
becomes meaningless neighbors between the
because: b. The nearest neighbor nearest and
becomes unreachable farthest
c. The data becomes sparse neighbors
d. There are many
uncorrelated features
12. When we update any a. Select authorization b. update
tuple in the relation b. Update authorization authorization
which Authorization on a c. Grant authorization
relation allows a user to? d. Define authorization
13. The grants privileges on a. Specified attributes c. Entire
SQL authorization b. Specified tuples Entire relation
mechanism doesn’t have relation
___ c. Entire relation
d. None of the above
14. An Error that occurs a. System error c. Logical
because of some internal b. View error error
condition that interrupts c. Logical error
the normal execution is d. Application Error
called
15. In which phase, the a. Repeating b. Redo
system replays updates of b. Redo
all transactions by c. Replay
scanning the log forward d. Undo
from the last checkpoint.
16. What is that part of main a. Buffer a. Buffer
memory available for b. Catalog
storage of copies of disk c. Storage
blocks. d. Secondary storage
17. In the buffer where there a. Pinned block strategy c. Buffer
is no space for another b. Forced output block replacement
block, the block can be c. Buffer replacement strategy strategy
inserted using ____ d. All of the mentioned
18. The frequently used a. Most recently used b. Least
buffer replacement b. Least recently used recently used
strategy is c. Longest block
d. All of the mentioned
19. The technique where the a. Replacement strategy d. Most
blocks which have been b. Forced strategy recently used
used are replaced is c. Crash recovery system
called ___ d. Most recently used
20. Which of the following is a. Network Transparency d. None of the
not a promise of b. Replication Transparency above
distributed database? c. Fragmentation
Transparency
d. None of the above
21. What is true about data a. Data Mining is defined as d. All of the
mining? the procedure of extracting above
information from huge sets
of data
b. Data mining also involves
other processes such as Data
Cleaning, Data Integration,
Data Transformation
c. Data mining is the
procedure of mining
knowledge from data
d. All of the above
22. What may be defined as a. Outlier Analysis a. Outlier
the data objects that do b. Evolution Analysis Analysis
not comply with the c. Prediction
general behavior or d. Classification
model of the data
available.
23. Which one of the a. Boot crash c. Transaction
following is a failure to a b. Read failure failure
system? c. Transaction failure
d. All of the mentioned
24. Which of the following a. Read error c. Logical
belongs to transaction b. Boot error error
failure? c. Logical error
d. All of the mentioned
25. The assumption that a. Stop assumption d. Fail-stop
hardware errors and bugs b. Fail assumption assumption
in the software bring the c. Halt assumption
system to a halt, but do d. Fail-stop assumption
not corrupt the
nonvolatile storage
contents, is known as the
26. Which kind of failure a. Transaction failure c. Disk failure
loses its data in head b. System crash
crash or failure during a c. Disk failure
transfer operation. d. All of the mentioned
27. Which of the following a. Bug in software d. All of the
causes system to crash b. Loss of volatile data mentioned
c. Hardware malfunction
d. All of the mentioned
28. The log is a sequence of a. Log records a. Log records
_________ recording all b. Records
the update activities in c. Entries
the database. d. Redo
29. Writing the buffered log a. Memory d. Disk
to __________ is b. Backup
sometimes referred to as c. Redo memory
a log force. d. Disk
30. The remote backup site is a. Primary Site b. Secondary
sometimes also called the b. Secondary Site Site
c. Tertiary Site
d. None of the mentioned

You might also like