logo

CuriousTab

CuriousTab

Discussion


Home Database Managing Multiuser Databases Comments

  • Question
  • The advantage of optimistic locking is that:


  • Options
  • A. the lock is obtained only after the transaction has processed.
  • B. the lock is obtained before the transaction has processed.
  • C. the lock never needs to be obtained.
  • D. transactions that are best suited are those with a lot of activity.

  • Correct Answer
  • the lock is obtained only after the transaction has processed. 


  • Managing Multiuser Databases problems


    Search Results


    • 1. In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed.

    • Options
    • A. Read committed
    • B. Read uncommitted
    • C. Repeatable read
    • D. Serializable
    • Discuss
    • 2. Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?

    • Options
    • A. Nonrepeatable read
    • B. Phantom read
    • C. Dirty read
    • D. Consistent read
    • Discuss
    • 3. Which of the following occurs when one transaction reads a changed record that has not been committed to the database?

    • Options
    • A. Nonrepeatable read
    • B. Phantom read
    • C. Dirty read
    • D. Consistent read
    • Discuss
    • 4. Which of the following refers to a cursor type where changes of any type and from any source are visible?

    • Options
    • A. Forward only
    • B. Static
    • C. Keyset
    • D. Dynamic
    • Discuss
    • 5. Locks placed by the DBMS are called ________ .

    • Options
    • A. implicit locks
    • B. explicit locks
    • C. exclusive locks
    • D. shared locks
    • Discuss
    • 6. A transaction for which all committed changes are permanent is called:

    • Options
    • A. atomic.
    • B. consistent.
    • C. isolated.
    • D. durable.
    • Discuss
    • 7. A cursor type in which the application sees the data as they were at the time the cursor was opened is called:

    • Options
    • A. forward only.
    • B. static.
    • C. keyset.
    • D. dynamic.
    • Discuss
    • 8. A cursor type in which the application can only move forward through the recordset is called:

    • Options
    • A. forward only.
    • B. static.
    • C. keyset.
    • D. dynamic.
    • Discuss
    • 9. Locks placed by command are called ________ .

    • Options
    • A. implicit locks
    • B. explicit locks
    • C. exclusive locks
    • D. shared locks
    • Discuss
    • 10. Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction?

    • Options
    • A. Nonrepeatable read
    • B. Phantom read
    • C. Dirty read
    • D. Consistent read
    • Discuss


    Comments

    There are no comments.

Enter a new Comment