1. | The log is a sequence of ___________, recording all the update activities in the database. |
Answer: (a).Log records
|
2. | In the ___________ scheme, a transaction that wants to update the database first creates a complete copy of the database. |
Answer: (a).Shadow copy
|
3. | The ____________ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location. |
Answer: (b).Shadow Paging
|
4. | The current copy of the database is identified by a pointer, called _____________, which is stored on disk. |
Answer: (a).Db-pointer
|
5. | If a transaction does not modify the database until it has committed, it is said to use the ___________ technique. |
Answer: (a).Deferred-modification
|
6. | If database modifications occur while the transaction is still active, the transaction is said to use the ___________technique. |
Answer: (c).Immediate-modification
|
7. | ____________ using a log record sets the data item specified in the log record to the old value. |
Answer: (d).Undo
|
8. | In the __________ phase, the system replays updates of all transactions by scanning the log forward from the last checkpoint. |
Answer: (b).Redo
|
9. | The actions which are played in the order while recording it is called ______________ history. |
Answer: (a).Repeating
|
10. | A special redo-only log record is written to the log, where V1 is the value being restored to data item Xj during the rollback. These log records are sometimes called |
Answer: (c). Compensation log records
|