ADVERTISEMENT
ADVERTISEMENT

DBMS Multiple Granularity MCQs

DBMS Multiple Granularity MCQs: This section contains multiple-choice questions and answers on Multiple Granularity in DBMS.
Submitted by Anushree Goswami, on April 21, 2022

1. Data items may be ___ based on their granularity.

  1. Opened
  2. Locked
  3. Added
  4. Closed

Answer: B) Locked

Explanation:

Data items may be locked based on their granularity.

Discuss this Question


2. Hierarchically creating lockable blocks within the database can be described as hierarchically ___ it up.

  1. Creating
  2. Breaking
  3. Locking
  4. Adding

Answer: B) Breaking

Explanation:

Hierarchically creating lockable blocks within the database can be described as hierarchically breaking it up.

Discuss this Question


3. ___ are reduced by using Multiple Granularity protocols.

  1. Concurrency
  2. Lock Overhead
  3. Both A and B
  4. None of the above

Answer: C) Both A and B

Explanation:

Concurrency and lock overhead are reduced by using Multiple Granularity protocols.

Discuss this Question


4. What is TRUE about Multiple Granularity?

  1. It keeps track of what should be locked and how.
  2. Data items can be locked and unlocked easily with this software.
  3. A tree can be used to represent this type of hierarchy graphically.
  4. All of the above

Answer: D) All of the above

Explanation:

In case of Multiple Granularity -

  1. It keeps track of what should be locked and how.
  2. Data items can be locked and unlocked easily with this software.
  3. A tree can be used to represent this type of hierarchy graphically.

Discuss this Question


5. How many additional lock modes are there with Multiple Granularity?

  1. 3
  2. 4
  3. 5
  4. 6

Answer: A) 3

Explanation:

There are 3 additional lock modes in Multiple Granularity.

Discuss this Question


6. Which of the following is the additional lock mode?

  1. Intention-shared
  2. Intention-exclusive
  3. Shared & Intention-exclusive
  4. All of the above

Answer: D) All of the above

Explanation:

The additional lock modes are -

  1. Intention-shared
  2. Intention-exclusive
  3. Shared & Intention-exclusive

Discuss this Question


7. What is the short form of Intention-shared?

  1. IS
  2. IX
  3. SIX
  4. None

Answer: A) IS

Explanation:

Short form of Intention-shared is IS.

Discuss this Question


8. Locking explicitly at lower levels of the tree is included in intention-shared, but only for ___ locks.

  1. Unique
  2. Multiple
  3. Two
  4. Shared

Answer: D) Shared

Explanation:

Locking explicitly at lower levels of the tree is included in intention-shared, but only for shared locks.

Discuss this Question


9. What is the short form of Intention-exclusive?

  1. IS
  2. IX
  3. SIX
  4. None

Answer: B) IX

Explanation:

Short form of Intention-exclusive is IX.

Discuss this Question


10. ___ locks are used in intention-exclusive locking at the lower level.

  1. Exclusive
  2. Shared
  3. Both A and B
  4. None of the above

Answer: C) Both A and B

Explanation:

Exclusive or shared locks are used in intention-exclusive locking at the lower level.

Discuss this Question


11. What is the short form of Shared & Intention-exclusive?

  1. SIE
  2. S&IE
  3. SAIE
  4. SIX

Answer: D) SIX

Explanation:

Short form of Shared & Intention-exclusive is SIX.

Discuss this Question


12. In a ___, some nodes are locked in exclusive mode by the same transaction while others are locked in shared mode.

  1. IS Lock
  2. IX Lock
  3. SIX Lock
  4. None

Answer: C) SIX Lock

Explanation:

In a SIX lock, some nodes are locked in exclusive mode by the same transaction while others are locked in shared mode.

Discuss this Question


13. What does compatibility matrix use to ensure serializability?

  1. Shared lock
  2. Intention lock
  3. Shared & Intention lock
  4. None of the above

Answer: B) Intention lock

Explanation:

Compatibility matrix uses intention lock to ensure serializability.

Discuss this Question


14. The protocol requires a node to follow which protocol(s) when attempting to lock a node?

  1. The lock-compatibility matrix should be followed for transactions.
  2. The first transaction in the tree locks the root.
  3. In any mode, the root can be locked.
  4. All of the above

Answer: D) All of the above

Explanation:

The protocol requires a node to follow these protocols when attempting to lock a node:

  1. The lock-compatibility matrix should be followed for transactions.
  2. The first transaction in the tree locks the root.
  3. In any mode, the root can be locked.

Discuss this Question


15. Nodes in S or IS modes will only be locked if the transaction's parent is locked in ___ mode.

  1. IS
  2. IX
  3. Both A and B
  4. None of the above

Answer: C) Both A and B

Explanation:

Nodes in S or IS modes will only be locked if the transaction's parent is locked in either IX or IS mode.

Discuss this Question


16. The transaction will lock a node in ___ mode only if the parent of the node is locked in IX or SIX.

  1. X
  2. SIX
  3. IX
  4. All of the above

Answer: D) All of the above

Explanation:

The transaction will lock a node in X, SIX, or IX mode only if the parent of the node is locked in IX or SIX.

Discuss this Question


17. The Transaction can lock a node if it has ____.

  1. Locked one node yet
  2. Locked two nodes yet
  3. Not locked any nodes yet
  4. Locked multiple nodes yet

Answer: C) Not locked any nodes yet

Explanation:

The Transaction can lock a node if it has not unlocked any nodes yet.

Discuss this Question


18. A transaction that currently has ___ children of the locked node will unlock the node if none are locked currently.

  1. One
  2. Two
  3. Multiple
  4. No

Answer: D) No

Explanation:

A transaction that currently has no children of the locked node will unlock the node if none are locked currently.

Discuss this Question


19. In multiple-granularity, locks are acquired ___ and locked down ¬___, respectively.

  1. Top-down, Bottom-up
  2. Bottom-up, Top-down
  3. Top-down
  4. Bottom-up

Answer: A) Top-down, Bottom-up

Explanation:

In multiple-granularity, locks are acquired top-down and locked down bottom-up, respectively.

Discuss this Question



ADVERTISEMENT
ADVERTISEMENT


Comments and Discussions!



ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT

Languages: » C » C++ » C++ STL » Java » Data Structure » C#.Net » Android » Kotlin » SQL
Web Technologies: » PHP » Python » JavaScript » CSS » Ajax » Node.js » Web programming/HTML
Solved programs: » C » C++ » DS » Java » C#
Aptitude que. & ans.: » C » C++ » Java » DBMS
Interview que. & ans.: » C » Embedded C » Java » SEO » HR
CS Subjects: » CS Basics » O.S. » Networks » DBMS » Embedded Systems » Cloud Computing
» Machine learning » CS Organizations » Linux » DOS
More: » Articles » Puzzles » News/Updates

© https://www.includehelp.com some rights reserved.