CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Database
‣
Managing Multiuser Databases
Comments
Question
Locks placed by command are called ________ .
Options
A. implicit locks
B. explicit locks
C. exclusive locks
D. shared locks
Correct Answer
explicit locks
Managing Multiuser Databases problems
Search Results
1. A cursor type in which the application can only move forward through the recordset is called:
Options
A. forward only.
B. static.
C. keyset.
D. dynamic.
Show Answer
Scratch Pad
Discuss
Correct Answer: forward only.
2. A cursor type in which the application sees the data as they were at the time the cursor was opened is called:
Options
A. forward only.
B. static.
C. keyset.
D. dynamic.
Show Answer
Scratch Pad
Discuss
Correct Answer: static.
3. A transaction for which all committed changes are permanent is called:
Options
A. atomic.
B. consistent.
C. isolated.
D. durable.
Show Answer
Scratch Pad
Discuss
Correct Answer: durable.
4. The advantage of optimistic locking is that:
Options
A. the lock is obtained only after the transaction has processed.
B. the lock is obtained before the transaction has processed.
C. the lock never needs to be obtained.
D. transactions that are best suited are those with a lot of activity.
Show Answer
Scratch Pad
Discuss
Correct Answer: the lock is obtained only after the transaction has processed.
5. In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed.
Options
A. Read committed
B. Read uncommitted
C. Repeatable read
D. Serializable
Show Answer
Scratch Pad
Discuss
Correct Answer: Read committed
6. Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction?
Options
A. Nonrepeatable read
B. Phantom read
C. Dirty read
D. Consistent read
Show Answer
Scratch Pad
Discuss
Correct Answer: Nonrepeatable read
7. Which of the following refers to the SQL Server transaction isolation level which places and holds locks on all rows that are read?
Options
A. REPEATABLE READ
B. SERIALIZABLE
C. READ COMMITTED
D. READ UNCOMMITTED
Show Answer
Scratch Pad
Discuss
Correct Answer: REPEATABLE READ
8. In SQL Server 2000, which of the following makes a copy of the changes that have been made to the database since the last complete backup?
Options
A. Complete backup
B. Transaction Log
C. Differential backup
D. None of the above is correct.
Show Answer
Scratch Pad
Discuss
Correct Answer: Differential backup
9. Which of the following is a way to create and modify tables using SQL Server?
Options
A. Write SQL code using either CREATE or ALTER SQL statements only.
B. Use the graphical facilities of SQL Server Enterprise Manager only.
C. Both of the two methods above will work.
D. Neither of the two methods above will work.
Show Answer
Scratch Pad
Discuss
Correct Answer: Both of the two methods above will work.
10. With this type of index, the bottom level of an index does not contain data, but rather it contains pointers to data.
Options
A. Nonclustered
B. Clustered
C. Primary
D. Secondary
Show Answer
Scratch Pad
Discuss
Correct Answer: Nonclustered
Comments
There are no comments.
Enter a new Comment
Save
More in Database:
Advanced SQL
Data and Database Administration
Data Modeling with ER Model
Data Models into Database Designs
Data Warehousing
Database Design Using Normalization
Database Processing for BIS
Database Redesign
Distributed Databases
ER Model and Business Rules
Introduction to Database
Introduction to SQL
JDBC, Java Server Pages, and MySQL
Logical Database Design
Managing Databases with Oracle
Managing Multiuser Databases
Modeling Data in the Organization
Object-Oriented Data Modeling
Object-Oriented Database
ODBC, OLE DB, ADO, and ASP
Physical Database Design
SQL for Database Construction
SQL Server 2000
The Client-Server Database
The Database Development Process
The Database Environment
The Internet Database Environment
The Relational Model and Normalization
XML and ADO.NET