DBMS-DATABASE RECOVERY SYSTEMS Questions and Answers

Take Exam

DBMS – Database Recovery Systems Questions with Answers help students understand how databases maintain consistency and restore data after failure. Topics include transaction logs, checkpoints, and recovery techniques. These DBMS programming interview questions with answers are valuable for candidates preparing for placements at Oracle, TCS, and Wipro. Practicing these ensures better conceptual clarity on database reliability and integrity mechanisms.

DBMS-DATABASE RECOVERY SYSTEMS

Showing 10 of 41 questions

31. When using a transaction log based recovery scheme, it might improve performance as well as providing a recovery mechanism by

  • writing the appropriate log records to disk during the transaction's execution
  • writing the log records to dick when each transaction commits
  • never writing the log records to disk.
  • waiting to write the log records until multiple transactions commit and writting them as a batch.
Show Answer Report

32. Which of the following is an example of a NO-UNDO/REDO algorithm /

  • Shadow paging
  • Immediate update
  • Deferred update
  • None of these
Show Answer Report

33. Which of the following is an example of a UNDO/REDO algorithm ?

  • Shadow paging
  • Immediate update
  • Deferrd update
  • None of these
Show Answer Report

34. If the shadowing approach is used for flushing a data item back to disk, then the item is written to

  • the same disk location from which it was read.
  • disk before the transaction commits.
  • disk only after the transaction commits.
  • a different location on disk.
Show Answer Report

35. If the shadowing approach is used for flushing a data item back to disk, then the item is written to

  • the same disk location form which it was read.
  • disk before the trasaction commits
  • disk only after the transaction commits.
  • a different location on disk.
Show Answer Report

36. Shadow paging was introduced by

  • Lorie
  • Codd
  • IBM
  • Boyce
Show Answer Report

37. Shadow paging technique maintains

  • two page tables
  • three page tables
  • four page tables
  • five page tables
Show Answer Report

38. The checkpoint technique is used to limit

  • the volume of log information.
  • amount of searching
  • subsequent processing that is needed to carry out on the transaction log file.
  • All of these
Show Answer Report

39. Which of the following recovery technique does not need log ?

  • Shadow paging
  • Immediate update
  • Deferred update
  • None of these
Show Answer Report

40. The failure may be the result of

  • a system crash due to hardware or software erors
  • a media failure such as head crash
  • a software error in the application such as a logical error in the program that is accessing the database
  • All of these.
Show Answer Report
Questions and Answers for Competitive Exams Various Entrance Test