Dirty read, nonrepeatable, and phantom reads are not possible in this instance.
Dirty read, nonrepeatable, and phantom reads are not possible in this instance.
Which of the following locks the item from access of any type?
Which of the following locks the item from access of any type?
Which of the following refers to a cursor type where changes of any type and from any source are visible?
Which of the following refers to a cursor type where changes of any type and from any source are visible?
A transaction in which either all of the database actions occur or none of them do is called:
A transaction in which either all of the database actions occur or none of them do is called:
Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?
Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?
What is the overall responsibility of the DBA?
What is the overall responsibility of the DBA?
Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?
Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?
In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed
In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed
Which of the following occurs when one transaction reads a changed record that has not been committed to the database?
Which of the following occurs when one transaction reads a changed record that has not been committed to the database?
Locks placed by the DBMS are called ________ .
Locks placed by the DBMS are called ________ .
Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?
Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?
The advantage of optimistic locking is that:
The advantage of optimistic locking is that:
A cursor type in which the application sees the data as they were at the time the cursor was opened is called:
A cursor type in which the application sees the data as they were at the time the cursor was opened is called:
A transaction for which all committed changes are permanent is called:
A transaction for which all committed changes are permanent is called:
A cursor type in which the application can only move forward through the recordset is called:
A cursor type in which the application can only move forward through the recordset is called:
Which of the following locks the item from change but not from read?
Which of the following locks the item from change but not from read?
The size of a lock is called:
The size of a lock is called:
Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction?
Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction?