Lock-Based Protocols - DBMS Questions and Answers

1.

Which of the following protocols ensures conflict serializability and safety from deadlocks?

   A.) Two-phase locking protocol
   B.) Time-stamp ordering protocol
   C.) Graph based protocol
   D.) None of the mentioned

Answer: Option 'B'

Time-stamp ordering protocol ensures conflict serializability and safety from deadlocks.

2.

All lock information is managed by a __________ which is responsible for assigning and policing the locks used by the transactions.

   A.) Scheduler
   B.) DBMS
   C.) Lock manager
   D.) Locking agent

Answer: Option 'C'

A distributed lock manager (DLM) provides distributed software applications with a means to synchronize their accesses to shared resources.

3.

Which of the following are introduced to reduce the overheads caused by the log-based recovery?

   A.) Checkpoints
   B.) Indices
   C.) Deadlocks
   D.) Locks

Answer: Option 'A'

Checkpoints are introduced to reduce overheads caused by the log-based recovery.

4.

Which refers to a property of computer to run several operation simultaneously and possible as computers await response of each other

   A.) Concurrency
   B.) Deadlock
   C.) Backup
   D.) Recovery

Answer: Option 'A'

Concurrency is a property of systems in which several computations are executing simultaneously, and potentially interacting with each other.

5.

Which of the following is the block that is not permitted to be written back to the disk?

   A.) Dead code
   B.) Read only
   C.) Pinned
   D.) Zapped

Answer: Option 'C'

​Pinned

Lock-Based Protocols - DBMS Questions and Answers Download Pdf