1. If a transaction acquires a shared lock, then it can perform .......... operation.
(1) read
(2) write
(3) read and write
(4) update
(5) append
Ans. (1) Read
2. Which of the following is not a property of transactions?
(1) Atomicity
(2) Concurrency
(3) Isolation
(4) Durability
(5) None of these
Ans. (2) Concurrency
3. Which of the following is not the internal sort?
(1) Insertion Sort
(2) Bubble Sort
(3) Merge Sort
(4) Heap Sort
(5) Hash Sort
Ans. (3) Merged Sort
4. Throughput means _______.
(1) number of transactions that are committed in one hour
(2) number of operations in a transaction
(3) number of transaction that can be aborted in a given amount of time
(4) number of transaction that can be executed in a given amount of time
(5) number of transaction that cannot be executed in a given amount of time
Ans. (4) Number of transaction that can be executed in a given amount of time
5. The……becomes different shapes depending on the task you are performing.
(1) Active tab
(2) Insertion point
(3) Mouse pointer
(4) Ribbon
(5) Passive tab
Ans. (3) Mouse pointer
6. ………… is not the operation that can be performed on queue.
(1) Insertion
(2) Deletion
(3) Retrieval
(4) Traversal
(5) None of these
Ans. (4) Traversal Operation
7. If a disk drive fails but the computer application running and using it can continue processing, this application is said to have been designed with this feature—
(1) 100 per cent uptime
(2) Fault tolerance
(3) High reliability
(4) High security
(5) All of these
Ans. (2) Fault tolerance
8. What is e-commerce?
(1) Buying and selling international goods
(2) Buying and selling products and services over the Internet
(3) Buying and selling products and services not found in stores
(4) Buying and selling products having to do with computers
(5) Buying and selling of electronic goods
Ans. (2) Buying and selling products and services over the Internet
9. Isolation of the transactions is ensured by _______.
(1) Transaction management
(2) Application programmer
(3) Concurrency control
(4) Recovery management
(5) Consistency Control
Ans. (3) Concurrency control
10. Which of the following functions are not performed by servers?
(1) Email processing
(2) Database sharing
(3) Processing Web sites
(4) Storage
(5) Word processing
Ans. (5) Word processing