logo

CuriousTab

CuriousTab

Discussion


Home Database Managing Multiuser Databases Comments

  • Question
  • Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?


  • Options
  • A. Forward only
  • B. Static
  • C. Keyset
  • D. Dynamic

  • Correct Answer
  • Keyset 


  • Managing Multiuser Databases problems


    Search Results


    • 1. Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?

    • Options
    • A. Read committed
    • B. Read uncommitted
    • C. Repeatable read
    • D. Serializable
    • Discuss
    • 2. Which of the following locks the item from access of any type?

    • Options
    • A. Implicit lock
    • B. Explicit lock
    • C. Exclusive lock
    • D. Shared lock
    • Discuss
    • 3. What is the overall responsibility of the DBA?

    • Options
    • A. Facilitate the development and use of the database
    • B. Create and populate tables
    • C. Development, operation, and maintenance of the database and its applications
    • D. Both the first and third answers above are correct.
    • Discuss
    • 4. Which of the following locks the item from change but not from read?

    • Options
    • A. Implicit lock
    • B. Explicit lock
    • C. Exclusive lock
    • D. Shared lock
    • Discuss
    • 5. What SQL structure is used to limit column values of a table?

    • Options
    • A. The LIMIT constraint
    • B. The CHECK constraint
    • C. The VALUE constraint
    • D. None of the above is correct.
    • Discuss
    • 6. Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads?

    • Options
    • A. Read committed
    • B. Read uncommitted
    • C. Repeatable read
    • D. Serializable
    • Discuss
    • 7. A transaction in which either all of the database actions occur or none of them do is called:

    • Options
    • A. atomic.
    • B. consistent.
    • C. isolated.
    • D. durable.
    • Discuss
    • 8. Dirty read, nonrepeatable, and phantom reads are not possible in this instance.

    • Options
    • A. Read committed
    • B. Read uncommitted
    • C. Repeatable read
    • D. Serializable
    • Discuss
    • 9. The size of a lock is called:

    • Options
    • A. implicit lock.
    • B. lock granularity.
    • C. exclusive lock.
    • D. shared lock.
    • Discuss
    • 10. Locks placed by the DBMS are called ________ .

    • Options
    • A. implicit locks
    • B. explicit locks
    • C. exclusive locks
    • D. shared locks
    • Discuss


    Comments

    There are no comments.

Enter a new Comment