Curioustab
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Take Free Test
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Take Free Test
Managing Multiuser Databases Questions
Transactional concurrency control: If two transactions run at the same time and the combined result is the same as if they had executed one after the other in some order, are those transactions considered serializable?
Database recovery terminology: Is a synchronization point between the database and its transaction log commonly called a “stop point”, or is there a standard term?
Isolation anomalies: Does a phantom read mean that, on reread, a transaction finds that previously read rows were modified or deleted by a committed transaction?
Transaction semantics: Is a transaction a series of database actions that must all succeed together, or else none take effect (all-or-nothing)?
Role clarity: Is the primary responsibility of the Database Administrator (DBA) to enable, support, and facilitate effective development and use of the organization’s databases?
Concurrency basics: When two transactions are processed at the same time against the database, are they called concurrent transactions?
Locking terminology: Is the “lock granularity” the size or scope of the lock (for example, row-level vs. page-level vs. table-level)?
ACID properties: Does an ACID transaction stand for atomic, consistent, isolated, and durable (the four fundamental guarantees)?
Durability property: In a durable transaction, are all changes that were committed guaranteed to be permanent?
Exclusive lock semantics: Does an exclusive (X) lock allow others to read but block changes, or does it block both readers and writers?
Database administration (DBA) refers to a technical function within the database environment. Does it necessarily apply to the entire organization?
Locking basics: if a lock is placed by an explicit command, is it considered an implicit lock?
Lock granularity terminology: is the “size of a lock” correctly called lock sizing?
Database security objective: is the goal to ensure only authorized users perform authorized activities at authorized times?
Resource locking purpose: does it prevent multiple applications from taking simultaneous write copies of the same record that is about to be changed?
Optimistic locking assumption: does it assume conflicts will occur frequently?
Transaction anomalies: reading uncommitted changes is called a “dirty read,” not a “filthy read.” Is the given statement correct?
Transaction log contents: are after-change copies called “before images”?
Lost update problem definition: is it when User A reads data that come from a partial (uncommitted) transaction of User B?
Who places “explicit” locks — the user or the DBMS? Are DBMS-placed locks called explicit?
1
2