logo

CuriousTab

CuriousTab

Discussion


Home Database Managing Multiuser Databases Comments

  • Question
  • A transaction in which either all of the database actions occur or none of them do is called:


  • Options
  • A. atomic.
  • B. consistent.
  • C. isolated.
  • D. durable.

  • Correct Answer
  • atomic. 


  • Managing Multiuser Databases problems


    Search Results


    • 1. Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads?

    • Options
    • A. Read committed
    • B. Read uncommitted
    • C. Repeatable read
    • D. Serializable
    • Discuss
    • 2. Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?

    • Options
    • A. Forward only
    • B. Static
    • C. Keyset
    • D. Dynamic
    • Discuss
    • 3. Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?

    • Options
    • A. Read committed
    • B. Read uncommitted
    • C. Repeatable read
    • D. Serializable
    • Discuss
    • 4. Which of the following locks the item from access of any type?

    • Options
    • A. Implicit lock
    • B. Explicit lock
    • C. Exclusive lock
    • D. Shared lock
    • Discuss
    • 5. What is the overall responsibility of the DBA?

    • Options
    • A. Facilitate the development and use of the database
    • B. Create and populate tables
    • C. Development, operation, and maintenance of the database and its applications
    • D. Both the first and third answers above are correct.
    • Discuss
    • 6. Dirty read, nonrepeatable, and phantom reads are not possible in this instance.

    • Options
    • A. Read committed
    • B. Read uncommitted
    • C. Repeatable read
    • D. Serializable
    • Discuss
    • 7. The size of a lock is called:

    • Options
    • A. implicit lock.
    • B. lock granularity.
    • C. exclusive lock.
    • D. shared lock.
    • Discuss
    • 8. Locks placed by the DBMS are called ________ .

    • Options
    • A. implicit locks
    • B. explicit locks
    • C. exclusive locks
    • D. shared locks
    • Discuss
    • 9. Which of the following refers to a cursor type where changes of any type and from any source are visible?

    • Options
    • A. Forward only
    • B. Static
    • C. Keyset
    • D. Dynamic
    • Discuss
    • 10. Which of the following occurs when one transaction reads a changed record that has not been committed to the database?

    • Options
    • A. Nonrepeatable read
    • B. Phantom read
    • C. Dirty read
    • D. Consistent read
    • Discuss


    Comments

    There are no comments.

Enter a new Comment