logo

CuriousTab

CuriousTab

Discussion


Home Database Managing Multiuser Databases Comments

  • Question
  • In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed.


  • Options
  • A. Read committed
  • B. Read uncommitted
  • C. Repeatable read
  • D. Serializable

  • Correct Answer
  • Read committed 


  • Managing Multiuser Databases problems


    Search Results


    • 1. Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?

    • Options
    • A. Nonrepeatable read
    • B. Phantom read
    • C. Dirty read
    • D. Consistent read
    • Discuss
    • 2. Which of the following occurs when one transaction reads a changed record that has not been committed to the database?

    • Options
    • A. Nonrepeatable read
    • B. Phantom read
    • C. Dirty read
    • D. Consistent read
    • Discuss
    • 3. Which of the following refers to a cursor type where changes of any type and from any source are visible?

    • Options
    • A. Forward only
    • B. Static
    • C. Keyset
    • D. Dynamic
    • Discuss
    • 4. Locks placed by the DBMS are called ________ .

    • Options
    • A. implicit locks
    • B. explicit locks
    • C. exclusive locks
    • D. shared locks
    • Discuss
    • 5. The size of a lock is called:

    • Options
    • A. implicit lock.
    • B. lock granularity.
    • C. exclusive lock.
    • D. shared lock.
    • Discuss
    • 6. The advantage of optimistic locking is that:

    • Options
    • A. the lock is obtained only after the transaction has processed.
    • B. the lock is obtained before the transaction has processed.
    • C. the lock never needs to be obtained.
    • D. transactions that are best suited are those with a lot of activity.
    • Discuss
    • 7. A transaction for which all committed changes are permanent is called:

    • Options
    • A. atomic.
    • B. consistent.
    • C. isolated.
    • D. durable.
    • Discuss
    • 8. A cursor type in which the application sees the data as they were at the time the cursor was opened is called:

    • Options
    • A. forward only.
    • B. static.
    • C. keyset.
    • D. dynamic.
    • Discuss
    • 9. A cursor type in which the application can only move forward through the recordset is called:

    • Options
    • A. forward only.
    • B. static.
    • C. keyset.
    • D. dynamic.
    • Discuss
    • 10. Locks placed by command are called ________ .

    • Options
    • A. implicit locks
    • B. explicit locks
    • C. exclusive locks
    • D. shared locks
    • Discuss


    Comments

    There are no comments.

Enter a new Comment