Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

A dump of the database contents is also referred to as an _____________ dump.(a) Archival(b) Fuzzy(c) SQL(d) All of the mentionedThe question was asked in semester exam.Question is taken from Failure with Nonvolatile Storage in portion Recovery System of Database Management

Answer»

The CORRECT choice is (a) Archival

Best EXPLANATION: We can archive the dumps and USE them later to examine OLD states of the database.

2.

In the __________ phase, the system replays updates of all transactions by scanning the log forward from the last checkpoint.(a) Repeating(b) Redo(c) Replay(d) UndoThis question was posed to me in a job interview.My question comes from Recovery in chapter Recovery System of Database Management

Answer»

Right CHOICE is (B) Redo

The EXPLANATION is: Undo brings the PREVIOUS contents.

3.

If a transaction does not modify the database until it has committed, it is said to use the ___________ technique.(a) Deferred-modification(b) Late-modification(c) Immediate-modification(d) UndoI had been asked this question in my homework.My doubt stems from Recovery topic in division Recovery System of Database Management

Answer»

The correct OPTION is (a) Deferred-modification

The best explanation: Deferred modification has the overhead that transactions need to make local copies of all UPDATED DATA ITEMS; further, if a transaction reads a data ITEM that it has updated, it must read the value from its local copy.

4.

Shadow paging has(a) no redo(b) no undo(c) redo but no undo(d) neither redo nor undoI got this question during an online exam.I want to ask this question from Lock Release and Undo Operations in section Recovery System of Database Management

Answer»

Right option is (a) no REDO

For EXPLANATION: UNDO erases all the CHANGES and redo MAKES the deleted changes.

5.

The system has entered an undesirable state (for example, deadlock), as a result of which a transaction cannot continue with its normal execution. This is(a) Read error(b) Boot error(c) Logical error(d) System errorI have been asked this question in examination.The above asked question is from Failure Classification in division Recovery System of Database Management

Answer»

The CORRECT ANSWER is (C) Logical error

The explanation is: The TRANSACTION, can be re-executed at a LATER time.

6.

Which of the following belongs to transaction failure(a) Read error(b) Boot error(c) Logical error(d) All of the mentionedThe question was asked during an online exam.The query is from Failure Classification topic in section Recovery System of Database Management

Answer»

Correct choice is (c) Logical error

Best EXPLANATION: TYPES of SYSTEM TRANSACTION failure are logical and system error.

7.

Immediate database modification technique uses(a) Both undo and redo(b) Undo but no redo(c) Redo but no undo(d) Neither undo nor redoThe question was asked at a job interview.My query is from Lock Release and Undo Operations topic in division Recovery System of Database Management

Answer» CORRECT ANSWER is (a) Both undo and redo

Best EXPLANATION: Undo erases all the changes and redo makes the DELETED changes.
8.

Non-volatile storage needs to have a _________ where the loses in future can be recovered.(a) Dump(b) Recover place(c) Disk(d) Redo planThis question was posed to me by my college director while I was bunking the class.I'd like to ask this question from Failure with Nonvolatile Storage topic in section Recovery System of Database Management

Answer»

Correct OPTION is (a) Dump

The best EXPLANATION: The BASIC scheme is to dump the ENTIRE CONTENTS of the database to stable storage periodically—say, once per day.

9.

The ALU of a computer normally contains a number of high speed storage element called(a) Semiconductor memory(b) Registers(c) Hard disks(d) Magnetic diskI have been asked this question in examination.I want to ask this question from Failure with Nonvolatile Storage topic in division Recovery System of Database Management

Answer» CORRECT option is (b) Registers

Best explanation: EXTERNAL CONTROL unit TELLS the ALU what operation to perform on that data, and then the ALU stores its result into an output REGISTER.
10.

The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as(a) Magnetic core memory(b) Magnetic tape memory(c) Magnetic disk memory(d) Magnetic bubble memoryThe question was posed to me by my college director while I was bunking the class.I would like to ask this question from Failure with Nonvolatile Storage topic in portion Recovery System of Database Management

Answer»

The correct OPTION is (d) MAGNETIC BUBBLE memory

To explain: Bubble DOMAIN VISUALIZATION by using CMOS-MagView.

11.

Before a block of data in main memory can be output to the database, all log records pertaining to data in that block must have been output to stable storage. This is(a) Read-write logging(b) Read-ahead logging(c) Write-ahead logging(d) None of the mentionedI have been asked this question during an interview for a job.My enquiry is from Buffer Management topic in chapter Recovery System of Database Management

Answer»

Correct answer is (c) Write-ahead logging

For EXPLANATION: The WAL rule requires only that the undo information in the LOG has been output to STABLE storage, and it permits the REDO information to be written LATER.

12.

Locks on buffer blocks are unrelated to locks used for concurrency-control of transactions, and releasing them in a non-two-phase manner does not have any implications on transaction serializability. This is(a) Latches(b) Swap Space(c) Dirty Block(d) None of the mentionedThe question was asked in final exam.My question is taken from Buffer Management topic in portion Recovery System of Database Management

Answer» RIGHT OPTION is (a) Latches

The BEST explanation: These locks, and other SIMILAR locks that are held for a SHORT duration.
13.

The _______________ policy, allows a transaction to commit even if it has modified some blocks that have not yet been written back to disk.(a) Force(b) No-force(c) Steal(d) No-stealThe question was asked during an interview for a job.Origin of the question is Buffer Management in chapter Recovery System of Database Management

Answer»

The CORRECT option is (B) No-force

Easy explanation - No-force policy ALLOWS FASTER COMMIT of transactions.

14.

The order of log records in the stable storage ____________ as the order in which they were written to the log buffer.(a) Must be exactly the same(b) Can be different(c) Is opposite(d) Can be partially sameThis question was addressed to me in a job interview.I'm obligated to ask this question of Buffer Management in portion Recovery System of Database Management

Answer»

Correct option is (a) Must be exactly the same

The explanation is: As a result of log BUFFERING, a log record may reside in only main MEMORY (VOLATILE storage) for a considerable time before it is OUTPUT to STABLE storage.

15.

The actions which are played in the order while recording it is called ______________ history.(a) Repeating(b) Redo(c) Replay(d) UndoI had been asked this question in an international level competition.This intriguing question originated from Recovery topic in division Recovery System of Database Management

Answer» RIGHT CHOICE is (a) Repeating

The best I can EXPLAIN: Undo BRINGS the PREVIOUS contents.
16.

The failure occurred sufficiently early during the transfer that the destination block remains intact.(a) Partial Failure(b) Total failure(c) Successful completion(d) Data transfer failureI got this question in an international level competition.This is a very interesting question from Failure Classification topic in portion Recovery System of Database Management

Answer» RIGHT OPTION is (a) PARTIAL Failure

Easy explanation - Copies of the DATA on other disks, or archival backups on tertiary media, such as DVD or tapes, are used to RECOVER from the failure.
17.

The transaction can no longer continue with its normal execution because of some internal condition, such as bad input, data not found, overflow, or resource limit exceeded. This is(a) Read error(b) Boot error(c) Logical error(d) System errorThe question was asked at a job interview.Asked question is from Failure Classification topic in chapter Recovery System of Database Management

Answer»

Correct option is (C) Logical error

Easy EXPLANATION - The transaction, can be re-executed at a LATER time.

18.

The simplest way of transferring control is for the old primary to receive __________ from the old backup site.(a) Undo logs(b) Redo Logs(c) Primary Logs(d) All of the mentionedI had been asked this question in class test.My query is from Remote Backup Systems topic in division Recovery System of Database Management

Answer»

Correct OPTION is (C) Primary Logs

For explanation: If control MUST be transferred back, the old backup site can pretend to have FAILED, resulting in the old primary TAKING over.

19.

The remote backup site is sometimes also called the(a) Primary Site(b) Secondary Site(c) Tertiary Site(d) None of the mentionedI got this question during an interview for a job.Origin of the question is Remote Backup Systems topic in division Recovery System of Database Management

Answer»

The correct option is (b) Secondary Site

Easy explanation - We can achieve high AVAILABILITY by performing transaction PROCESSING at one site, CALLED the primary site, and having a remote backup site where all the DATA from the primary site are replicated.

20.

To perform logical redo or undo, the database state on disk must be operation ___________ that is, it should not have partial effects of any operation.(a) Persistent(b) Resistant(c) Consistent(d) None of the mentionedThis question was addressed to me in unit test.My question comes from Lock Release and Undo Operations topic in chapter Recovery System of Database Management

Answer» CORRECT CHOICE is (c) Consistent

Easy explanation - Data STRUCTURES such as B+-trees WOULD not be in a consistent state, and neither logical redo nor logical undo operations can be PERFORMED on an inconsistent data structure.
21.

The silicon chips used for data processing are called(a) RAM chips(b) ROM chips(c) Micro processors(d) PROM chipsI had been asked this question during an interview.Origin of the question is Failure with Nonvolatile Storage in chapter Recovery System of Database Management

Answer» CORRECT ANSWER is (d) PROM chips

Easy EXPLANATION - PROM is Programmable READ Only Memory.
22.

Which of the following is used for undo operations alone?(a) Logical logging(b) Physical logging(c) Physical log records(d) Physical logging and Physical log recordsThe question was posed to me in my homework.I'd like to ask this question from Lock Release and Undo Operations topic in chapter Recovery System of Database Management

Answer»

The CORRECT ANSWER is (a) Logical LOGGING

The best I can explain: If the OPERATION inserted an ENTRY in a B+-tree, the undo information U would indicate that a deletion operation is to be performed, and would identify the B+-tree and what entry to delete from the tree. Such logging of information about operations is called logical logging.

23.

______________ policy allows multiple updates to accumulate on a block before it is output to stable storage, which can reduce the number of output operations greatly for frequently updated blocks.(a) Force(b) No-force(c) Steal(d) No-stealThe question was asked in an international level competition.The origin of the question is Buffer Management topic in chapter Recovery System of Database Management

Answer» RIGHT answer is (b) No-force

Easiest EXPLANATION - No-force policy ALLOWS FASTER COMMIT of transactions.
24.

The ____________ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.(a) Shadow copy(b) Shadow Paging(c) Update log records(d) All of the mentionedThis question was posed to me in my homework.Enquiry is from Recovery in division Recovery System of Database Management

Answer» RIGHT choice is (b) SHADOW Paging

The explanation is: Any PAGE which is not updated by a transaction is not copied, but INSTEAD the NEW page table just stores a pointer to the original page.
25.

There are special redo-only log records generated during transaction rollback, called _________ in ARIES.(a) Compensation log records(b) Read log records(c) Page log records(d) Redo log recordsThe question was asked during an internship interview.Asked question is from ARIES in division Recovery System of Database Management

Answer»

The correct option is (a) Compensation log RECORDS

The BEST I can EXPLAIN: These SERVE the same PURPOSE as the redo-only log records in our earlier recovery scheme.

26.

Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the _______ field of the page.(a) LSN(b) ReadLSN(c) PageLSN(d) RedoLSNThis question was addressed to me in quiz.This interesting question is from ARIES in section Recovery System of Database Management

Answer»

Correct OPTION is (C) PAGELSN

Easy explanation - Each PAGE MAINTAINS an identifier called the PageLSN.

27.

__________ scheme that records only information about dirty pages and associated information and does not even require of writing dirty pages to disk.(a) Fuzzy logic(b) Checkpoints(c) Fuzzy-checkpoint(d) Logical checkpointI had been asked this question by my college director while I was bunking the class.My query is from ARIES topic in section Recovery System of Database Management

Answer»

Right OPTION is (c) Fuzzy-checkpoint

Best explanation: It flushes dirty PAGES in the background, continuously, instead of writing them during checkpoints.

28.

The assumption that hardware errors and bugs in the software bring the system to a halt, but do not corrupt the nonvolatile storage contents, is known as the(a) Stop assumption(b) Fail assumption(c) Halt assumption(d) Fail-stop assumptionThis question was addressed to me in class test.Origin of the question is Failure Classification in portion Recovery System of Database Management

Answer»

Right OPTION is (d) Fail-stop assumption

The best I can explain: Well-designed systems have numerous INTERNAL checks, at the hardware and the software level, that bring the system to a HALT when there is an error. HENCE, the fail-stop assumption is a reasonable one.

29.

The recovery scheme must also provide(a) High availability(b) Low availability(c) High reliability(d) High durabilityThis question was addressed to me in final exam.My doubt stems from Failure Classification topic in portion Recovery System of Database Management

Answer» RIGHT option is (a) High availability

The best explanation: It MUST MINIMIZE the time for which the database is not usable after a FAILURE.
30.

Once the lower-level lock is released, the operation cannot be undone by using the old values of updated data items, and must instead be undone by executing a compensating operation; such an operation is called(a) Logical operation(b) Redo operation(c) Logical undo operation(d) Undo operationThis question was addressed to me in an interview for internship.Question is from Lock Release and Undo Operations in division Recovery System of Database Management

Answer»

The correct OPTION is (a) LOGICAL operation

The BEST I can EXPLAIN: It is important that the lower-level locks acquired during an operation are SUFFICIENT to perform a subsequent logical undo of the operation.

31.

Which one of the following is a failure to a system(a) Boot crash(b) Read failure(c) Transaction failure(d) All of the mentionedThe question was posed to me during an online exam.The above asked question is from Failure Classification topic in section Recovery System of Database Management

Answer»

Correct CHOICE is (c) TRANSACTION failure

Easiest explanation - TYPES of system failure are transaction failure, system CRASH and disk failure.

32.

When the __________ the backup site takes over processing and becomes the primary.(a) Secondary fails(b) Backup recovers(c) Primary fails(d) None of the mentionedThis question was posed to me by my college director while I was bunking the class.My question is from Remote Backup Systems topic in division Recovery System of Database Management

Answer» RIGHT answer is (c) Primary fails

Best EXPLANATION: When the original primary SITE recovers, it can either play the role of REMOTE BACKUP, or take over the role of primary site again.
33.

Remote backup system must be _________ with the primary site.(a) Synchronised(b) Separated(c) Connected(d) Detached but relatedThe question was asked during an interview.My question comes from Remote Backup Systems topic in chapter Recovery System of Database Management

Answer»

Correct option is (a) Synchronised

Best explanation: We can achieve high availability by PERFORMING transaction PROCESSING at one site, called the PRIMARY site, and having a REMOTE backup site where all the data from the primary site are REPLICATED.

34.

An operation is said to be __________ if executing it several times in a row gives the same result as executing it once.(a) Idempotent(b) Changed(c) Repetitive(d) All of the aboveI had been asked this question in class test.This key question is from Lock Release and Undo Operations topic in chapter Recovery System of Database Management

Answer» RIGHT option is (a) Idempotent

The best I can explain: OPERATIONS such as INSERTING an entry into a B+-tree may not be idempotent, and the recovery algorithm must therefore make sure that an operation that has ALREADY been PERFORMED is not performed again.
35.

The ___________ policy, allows the system to write modified blocks to disk even if the transactions that made those modifications have not all committed.(a) Force(b) No-force(c) Steal(d) No-stealThe question was posed to me in my homework.I'd like to ask this question from Buffer Management in section Recovery System of Database Management

Answer»

Correct ANSWER is (C) Steal

The best EXPLANATION: The no-steal POLICY does not work with transactions that perform a large number of UPDATES.

36.

A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is(a) One Safe(b) Two Safe(c) Two-very Safe(d) Very SafeI have been asked this question in my homework.Question is from Remote Backup Systems in section Recovery System of Database Management

Answer»

Correct option is (a) ONE Safe

The EXPLANATION is: The PROBLEM with this scheme is that the updates of a committed transaction may not have made it to the backup SITE, when the backup site takes over PROCESSING.

37.

Which of the following is used only for data entry and storage, and never for processing?(a) Mouse(b) Dumb terminal(c) Micro computer(d) Dedicated data entry systemI had been asked this question at a job interview.The query is from Failure with Nonvolatile Storage in division Recovery System of Database Management

Answer»

Right answer is (b) Dumb terminal

The EXPLANATION is: Dumb TERMINALS are those that can INTERPRET a limited NUMBER of CONTROL codes.

38.

____________ using a log record sets the data item specified in the log record to the old value.(a) Deferred-modification(b) Late-modification(c) Immediate-modification(d) UndoThis question was posed to me in a national level competition.My question comes from Recovery topic in section Recovery System of Database Management

Answer»

Correct choice is (d) Undo

Easiest EXPLANATION - Undo brings the PREVIOUS CONTENTS.

39.

If database modifications occur while the transaction is still active, the transaction is said to use the ___________technique.(a) Deferred-modification(b) Late-modification(c) Immediate-modification(d) UndoI have been asked this question in final exam.I'm obligated to ask this question of Recovery in chapter Recovery System of Database Management

Answer»

The correct answer is (c) Immediate-modification

Best EXPLANATION: We say a transaction MODIFIES the DATABASE if it performs an update on a disk buffer, or on the disk itself; UPDATES to the private part of main MEMORY do not count as database modifications.

40.

In the ___________ scheme, a transaction that wants to update the database first creates a complete copy of the database.(a) Shadow copy(b) Shadow Paging(c) Update log records(d) All of the mentionedI had been asked this question during an online interview.Origin of the question is Recovery in division Recovery System of Database Management

Answer»

The correct option is (a) Shadow copy

Easy explanation - If at any point the TRANSACTION has to be ABORTED, the system merely deletes the NEW copy. The OLD copy of the database has not been affected.

41.

The database is partitioned into fixed-length storage units called(a) Parts(b) Blocks(c) Reads(d) BuildThis question was addressed to me in an internship interview.This question is from Failure Classification topic in section Recovery System of Database Management

Answer»

Correct choice is (B) Blocks

Explanation: Blocks are the units of DATA transfer to and from DISK, and may contain several data items.

42.

The backup is taken by(a) Erasing all previous records(b) Entering the new records(c) Sending all log records from primary site to the remote backup site(d) Sending selected records from primary site to the remote backup siteI have been asked this question in my homework.Asked question is from Remote Backup Systems in portion Recovery System of Database Management

Answer»

Right CHOICE is (c) Sending all log records from primary SITE to the remote backup site

The best EXPLANATION: We can achieve high availability by performing transaction processing at ONE site, called the primary site, and having a remote backup site where all the DATA from the primary site are replicated.

43.

Which lock should be obtained to prevent a concurrent transaction from executing a conflicting read, insert or delete operation on the same key value.(a) Higher-level lock(b) Lower-level lock(c) Read only lock(d) Read writeI have been asked this question by my school principal while I was bunking the class.Question is from Lock Release and Undo Operations in division Recovery System of Database Management

Answer»

Correct OPTION is (a) Higher-level lock

To explain: Operations acquire lower-level locks while they execute, but RELEASE them when they COMPLETE; the CORRESPONDING transaction MUST however retain a higher-level lock in a two-phase manner to prevent concurrent transactions from executing conflicting actions.

44.

In order to reduce the overhead in retrieving the records from the storage space we use(a) Logs(b) Log buffer(c) Medieval space(d) Lower recordsThe question was asked by my school principal while I was bunking the class.This intriguing question originated from Buffer Management topic in chapter Recovery System of Database Management

Answer»

The CORRECT option is (b) LOG buffer

The EXPLANATION is: The OUTPUT to STABLE storage is in units of blocks.

45.

___________ determines which transactions to undo, which pages were dirty at the time of the crash, and the LSN from which the redo pass should start.(a) Analysis pass(b) Redo pass(c) Undo pass(d) None of the mentionedI got this question during an internship interview.Enquiry is from ARIES in chapter Recovery System of Database Management

Answer»

Right ANSWER is (a) ANALYSIS PASS

Best explanation: The analysis pass FINDS the last complete checkpoint log record, and reads in the DirtyPageTable from this record.

46.

Which kind of failure loses its data in head crash or failure during a transfer operation.(a) Transaction failure(b) System crash(c) Disk failure(d) All of the mentionedThe question was asked by my college director while I was bunking the class.Origin of the question is Failure Classification in division Recovery System of Database Management

Answer»

Right choice is (c) DISK failure

The BEST EXPLANATION: Copies of the data on other disks, or archival backups on TERTIARY media, such as DVD or tapes, are used to RECOVER from the failure.

47.

The __________________ contains a list of blocks that have been updated in the database buffer.(a) Latches(b) Swap Space(c) Dirty Block(d) None of the mentionedThis question was addressed to me in unit test.Question is from Buffer Management topic in division Recovery System of Database Management

Answer»

Right choice is (c) DIRTY Block

For explanation: Dirty blocks are those that have been UPDATED in memory, and the DISK VERSION is not up-to-date.

48.

A _______________ configuration can make takeover by the backup site almost instantaneous.(a) Hot-spare(b) Remote(c) Direct(d) SpareI have been asked this question in final exam.The origin of the question is Remote Backup Systems in chapter Recovery System of Database Management

Answer»

Right choice is (d) Spare

To explain: In this CONFIGURATION, the remote backup site CONTINUALLY processes redo LOG RECORDS as they arrive, applying the updates locally.

49.

A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site. This is(a) One Safe(b) Two Safe(c) Two-very Safe(d) Very SafeI have been asked this question during an online exam.The doubt is from Remote Backup Systems in division Recovery System of Database Management

Answer»

Right answer is (c) Two-very Safe

Easiest EXPLANATION - The problem with this SCHEME is that transaction processing cannot PROCEED if EITHER the primary or the BACKUP site is down.

50.

The __________________ contains a list of pages that have been updated in the database buffer.(a) Dirty page table(b) Page table(c) Dirty redo(d) All of the mentionedI had been asked this question during an interview.This intriguing question comes from ARIES in division Recovery System of Database Management

Answer»

Correct choice is (a) Dirty PAGE table

Easiest explanation - Dirty pages are those that have been updated in MEMORY, and the DISK VERSION is not up-to-date.