adplus-dvertising
frame-decoration

Question

When a deadlock is detected the recovery is normally accomplished by :

a.

rollback of transaction

b.

locking of data

c.

consistency checking

d.

none of these

Posted under DBMS

Answer: (a).rollback of transaction

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. When a deadlock is detected the recovery is normally accomplished by :

Similar Questions

Discover Related MCQs

Q. Which is not a desirable property of a transaction ?

Q. A directed graph which represents the deadlock is called :

Q. Transaction Throughput is :

Q. Data encryption techniques are particularly useful for

Q. Before any changes to database structure are attempted one should first:

Q. Which of the following modifications may not succeed?

Q. Because of the importance of making data model changes correctly, many professionals are ________ about using an automated process for database redesign.

Q. Which of the following can cause a transaction failure

Q. If the transaction can no longer continue with its normal execution because of some internal condition, it is called as a _________

Q. If a system has entered and undesirable state due to which it is unable to continue with normal execution, it is called as _________

Q. If there is a hardware malfunction or a bug in the database that causes the loss of content of volatile storage, it is called as ________

Q. The assumption that the hardware errors bring the system to a halt is called as ________

Q. Which of the following is not a classification of storage

Q. If a failure has occurred in the midst of a transfer, it is called as _________

Q. State true or false: The destination block has incorrect information in case of a total failure

Q. The partitions of the database into fixed length storage units are called as __________

Q. The blocks residing on the disk are referred to as ___________

Q. The area of memory where blocks temporarily reside is called as ________

Q. The most widely used structure for recording database modification is called as _______

Q. An update log record describes a ________ database write