adplus-dvertising
frame-decoration

Question

If a system has entered and undesirable state due to which it is unable to continue with normal execution, it is called as _________

a.

Logical error

b.

System error

c.

System crash

d.

None of the mentioned

Posted under Recovery System DBMS

Answer: (b).System error

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. If a system has entered and undesirable state due to which it is unable to continue with normal execution, it is called as _________

Similar Questions

Discover Related MCQs

Q. If there is a hardware malfunction or a bug in the database that causes the loss of content of volatile storage, it is called as ________

Q. The assumption that the hardware errors bring the system to a halt is called as ________

Q. Which of the following is not a classification of storage

Q. If a failure has occurred in the midst of a transfer, it is called as _________

Q. State true or false: The destination block has incorrect information in case of a total failure

Q. The partitions of the database into fixed length storage units are called as __________

Q. The blocks residing on the disk are referred to as ___________

Q. The area of memory where blocks temporarily reside is called as ________

Q. The most widely used structure for recording database modification is called as _______

Q. An update log record describes a ________ database write

Q. Which of the following fields does the update log record have?

Q. The unique identifier of the transaction that performed the write operation is called as _______

Q. The value of the data item prior to the write is called as _________

Q. If a transaction does not modify the database until it has committed it is said to use a _______ modification technique

Q. We say that a transaction has been ________ when its commit log record has been output to stable storage.

Q. State true or false: Using checkpoints reduces overhead

Q. A __________ checkpoint is a checkpoint where transactions are allowed to perform updates even while buffer blocks are being written out.

Q. If the database modifications occur while the transaction is still active, the transaction is said to use the __________ modification technique

Q. The log is a sequence of _________ recording all the update activities in the database.

Q. The current copy of the database is identified by a pointer, called ____________ which is stored on disk.