CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Database
‣
Managing Multiuser Databases
Comments
Question
Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?
Options
A. Read committed
B. Read uncommitted
C. Repeatable read
D. Serializable
Correct Answer
Read uncommitted
Managing Multiuser Databases problems
Search Results
1. Which of the following locks the item from access of any type?
Options
A. Implicit lock
B. Explicit lock
C. Exclusive lock
D. Shared lock
Show Answer
Scratch Pad
Discuss
Correct Answer: Exclusive lock
2. What is the overall responsibility of the DBA?
Options
A. Facilitate the development and use of the database
B. Create and populate tables
C. Development, operation, and maintenance of the database and its applications
D. Both the first and third answers above are correct.
Show Answer
Scratch Pad
Discuss
Correct Answer: Both the first and third answers above are correct.
3. Which of the following locks the item from change but not from read?
Options
A. Implicit lock
B. Explicit lock
C. Exclusive lock
D. Shared lock
Show Answer
Scratch Pad
Discuss
Correct Answer: Shared lock
4. What SQL structure is used to limit column values of a table?
Options
A. The LIMIT constraint
B. The CHECK constraint
C. The VALUE constraint
D. None of the above is correct.
Show Answer
Scratch Pad
Discuss
Correct Answer: The CHECK constraint
5. A reason for using an SQL view to hide columns is:
Options
A. to simplify a result only.
B. to prevent the display of sensitive data only.
C. to accomplish both of the above.
D. None of the above are reasons for using an SQL view.
Show Answer
Scratch Pad
Discuss
Correct Answer: to accomplish both of the above.
6. Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?
Options
A. Forward only
B. Static
C. Keyset
D. Dynamic
Show Answer
Scratch Pad
Discuss
Correct Answer: Keyset
7. Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads?
Options
A. Read committed
B. Read uncommitted
C. Repeatable read
D. Serializable
Show Answer
Scratch Pad
Discuss
Correct Answer: Repeatable read
8. A transaction in which either all of the database actions occur or none of them do is called:
Options
A. atomic.
B. consistent.
C. isolated.
D. durable.
Show Answer
Scratch Pad
Discuss
Correct Answer: atomic.
9. Dirty read, nonrepeatable, and phantom reads are not possible in this instance.
Options
A. Read committed
B. Read uncommitted
C. Repeatable read
D. Serializable
Show Answer
Scratch Pad
Discuss
Correct Answer: Serializable
10. The size of a lock is called:
Options
A. implicit lock.
B. lock granularity.
C. exclusive lock.
D. shared lock.
Show Answer
Scratch Pad
Discuss
Correct Answer: lock granularity.
Comments
There are no comments.
Enter a new Comment
Save
More in Database:
Advanced SQL
Data and Database Administration
Data Modeling with ER Model
Data Models into Database Designs
Data Warehousing
Database Design Using Normalization
Database Processing for BIS
Database Redesign
Distributed Databases
ER Model and Business Rules
Introduction to Database
Introduction to SQL
JDBC, Java Server Pages, and MySQL
Logical Database Design
Managing Databases with Oracle
Managing Multiuser Databases
Modeling Data in the Organization
Object-Oriented Data Modeling
Object-Oriented Database
ODBC, OLE DB, ADO, and ASP
Physical Database Design
SQL for Database Construction
SQL Server 2000
The Client-Server Database
The Database Development Process
The Database Environment
The Internet Database Environment
The Relational Model and Normalization
XML and ADO.NET