Transaction Management and Concurrency Control, Chapter 12
Quiz
____ ensures that once transaction changes are done, they cannot be undone or lost, even in the event of a system failure.
Atomicity
Consistency
Durability
Isolation
Deadlocks are possible only when one of the transactions wants to obtain a(n) ____ lock on a data item.
binary
exclusive
shared
complete
If several concurrent transactions are executed over the same data set and the second transaction updates the database before the first transaction is finished, the ____ property is violated and the database is no longer consistent.
atomicity
consistency
isolation
durability
A DBMS uses a transaction ____ to keep track of all transactions that update the database
log
table
block
statement
The Oracle RDBMS uses the ____ statement to declare a new transaction start and its properties.
BEGIN
SET TRANSACTION
BEGIN TRANSACTION
COMMIT
When a program is abnormally terminated, the equivalent of a ____ command occurs.
COMMIT
ROLLBACK
QUIT
EXIT
When the recovery procedure uses ____, the database is immediately updated by transaction operations during the transaction's execution, even before the transaction reaches its commit point.
write-through
deferred write
immediate write
unbuffered
In a(n) ____ backup of the database, only the last modifications to the database are copied.
full
incomplete
differential
transaction log
Although the ____ locking approach improves the availability of data, its management requires high overhead.
database-level
table-level
page-level
row-level
A(n) ____ lock exists when concurrent transactions are granted Read access on the basis of a common lock.
binary
field-level
shared
exclusive
A ____ database state is one in which all data integrity constraints are satisfied.
fixed
complete
consistent
secure
The ____ statement is used to end a successful transaction.
COMMIT
DONE
END
QUIT
____ means that the data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
Atomicity
Consistency
Durability
Isolation
The three basic techniques to control deadlocks are: deadlock ____, deadlock detection, and deadlock avoidance.
prevention
prohibition
rollback
commits
All transactions are controlled and executed by the DBMS (subject to some limitations) to guarantee database ____.
integrity
uniqueness
consistency
design
In a ____ lock, the DBMS will lock an entire disk page.
database-level
table-level
page-level
row-level
All lock information is managed by a ____, which is responsible for assigning and policing the locks used by the transactions.
scheduler
DBMS
lock manager
locking agent
According to the ANSI SQL standard, when does a transaction begin?
with use of the START command
when the first SQL statement is encountered
with the BEGIN command
with the BEGIN TRANSACTION command
The ____ lock allows concurrent transactions to access the same row as long as they require the use of different fields within that row.