Curioustab
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Home
»
Database
»
Managing Multiuser Databases
The size of a lock is called:
implicit lock.
lock granularity.
exclusive lock.
shared lock.
Correct Answer:
lock granularity.
← Previous Question
Next Question→
More Questions from
Managing Multiuser Databases
Locks placed by the DBMS are called ________ .
Which of the following refers to a cursor type where changes of any type and from any source are visible?
Which of the following occurs when one transaction reads a changed record that has not been committed to the database?
Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?
In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed.
The advantage of optimistic locking is that:
A transaction for which all committed changes are permanent is called:
A cursor type in which the application sees the data as they were at the time the cursor was opened is called:
A cursor type in which the application can only move forward through the recordset is called:
Locks placed by command are called ________ .
Discussion & Comments
No comments yet. Be the first to comment!
Name:
Comment:
Post Comment
Join Discussion
Discussion & Comments