T4Tutorials .PK

NSCT – Recovery Management MCQs

1. . Recovery management in DBMS is used to:

(A) Restore the database to a correct state after a failure


(B) Compress tables


(C) Encrypt tables


(D) Delete old records




2. . A database crash can occur due to:

(A) Encryption errors


(B) Data compression


(C) Hardware failure, software failure, or power outage


(D) Deletion of old records




3. . A transaction log is:

(A) A compressed table


(B) A backup file


(C) A record of all database operations used for recovery


(D) An encrypted key




4. . Rollback recovery is used to:

(A) Compress tables


(B) Redo committed transactions


(C) Encrypt data


(D) Undo changes of uncommitted transactions after a crash




5. . Rollforward recovery is used to:

(A) Undo uncommitted transactions


(B) Redo committed transactions using logs after restoring from backup


(C) Encrypt tables


(D) Compress tables




6. . Checkpointing in DBMS is:

(A) Deleting old records


(B) Compression of tables


(C) Encryption of logs


(D) A mechanism to save the current state of the database to reduce recovery time




7. . Immediate database modification means:

(A) Data is compressed


(B) Changes are applied after commit only


(C) Changes are applied to the database before the transaction commits


(D) Data is encrypted




8. . Deferred database modification means:

(A) Changes are applied to the database only after the transaction commits


(B) Changes are applied immediately


(C) Data is compressed


(D) Data is encrypted




9. . Undo operation is used to:

(A) Encrypt data


(B) Redo committed transactions


(C) Compress data


(D) Reverse the effects of uncommitted transactions




10. . Redo operation is used to:

(A) Reapply changes of committed transactions


(B) Undo uncommitted transactions


(C) Compress tables


(D) Encrypt logs




11. . Shadow paging is:

(A) A recovery technique that maintains a shadow copy of the database pages


(B) Encrypting pages


(C) Compressing tables


(D) Backup scheduling




12. . ARIES recovery algorithm stands for:

(A) Algorithms for Recovery and Isolation Exploiting Semantics


(B) Automatic Recovery in Encryption System


(C) Advanced Redo Immediate Execution System


(D) Atomic Recovery in Indexing System




13. . In ARIES, logging includes:

(A) Encrypting logs


(B) Compressing tables


(C) Undo, redo, and redo-next operations


(D) Deleting old files




14. . Stable storage refers to:

(A) Storage that survives system crashes


(B) Compressed storage


(C) Encrypted storage


(D) Temporary storage




15. . Database backup can be:

(A) Only full backup


(B) Full backup, incremental backup, or differential backup


(C) Only compressed backup


(D) Only encrypted backup




16. . Full database backup means:

(A) Compressing tables


(B) Copying only changed data


(C) Copying the entire database


(D) Encrypting tables




17. . Incremental backup means:

(A) Compressing tables


(B) Copying entire database


(C) Copying only data modified since the last backup


(D) Encrypting tables




18. . Differential backup means:

(A) Encrypting data


(B) Copying only modified pages


(C) Compressing data


(D) Copying all changes made since the last full backup




19. . The purpose of recovery management is to:

(A) Encrypt tables


(B) Compress tables


(C) Ensure database reliability and consistency after failures


(D) Delete old data automatically




20. . The main goal of recovery management in DBMS is to:

(A) Encrypt tables


(B) Compress data


(C) Restore committed data, undo uncommitted data, and maintain database integrity


(D) Delete old records




Exit mobile version