You are watching: Which type of lock assumes that no conflicts will occur?
Which the the adhering to is no a way of handling databases?A) web applications using ASPB) net applications utilizing JSPC) Applications invoking save on computer proceduresD) program coded in C#E) every one of the above are method of handling a database.
The function of concurrency manage is to:A) ensure that each kind has a corresponding report.B) ensure that ASPs perform not duplicate JSPs.C) ensure the one user"s work-related does not interfere v another"s.D) ensure that stored procedures do no invoke triggers.E) ensure that triggers perform not invoke save on computer procedures.
When a transaction attributes in together a method that either all of the transaction actions are completed or none of them will be, the transaction is claimed to be:A) consistent.B) isolated.C) atomic.D) locked.E) logical.
What concurrent processing trouble occurs when a transaction rereads data and also finds brand-new rows that were inserted by a various transaction due to the fact that the former read?A) Nonrepeatable readsB) Phantom readsC) Dirty readsD) Serialized readsE) Unlocked reads
What concurrent processing trouble occurs when a transaction reads a readjusted record that has not been committed come the database?A) Nonrepeatable readsB) Phantom readsC) Dirty readsD) Serialized readsE) Unlocked reads
Preventing many applications native obtaining copies of the very same record once the document is about to changed is called:A) serialized reading.B) shed updating.C) concurrent processing.D) resource locking.E) block factoring.
Whether a lock uses to data at the record level, page level, table level, or database level is referred to as:A) lock exclusivity.B) lock sharing.C) lock phasing.D) serializable locking.E) lock granularity.
Which the the complying with is true around a mutual lock?A) the is much more restrictive 보다 an implicit lock.B) It enables only two transactions to upgrade a document simultaneously.C) that locks the items from every access.D) It permits reads to the locked item.E) It need to use a two-phase locking scheme.
Which type of lock assumes that no problems will occur?A) confident locksB) Granular locksC) clear locksD) common locksE) open up locks
An acid transaction is one that is:A) atomic.B) consistent.C) isolated.D) durable.E) all of the above
Ensuring that each SQL statement separately processes continuous rows is recognized as:A) transaction level consistency.B) live independence consistency.C) explain level consistency.D) process level consistency.E) serializable consistency.
What is the least restrictive isolation level that will prevent phantom read problems?A) check out CommittedB) SerializableC) check out UncommittedD) atomic ReadE) Repeatable Read
What is the the very least restrictive isolation level the will protect against dirty reads?A) check out CommittedB) SerializableC) review UncommittedD) atom ReadE) Repeatable Read
What is the least restrictive isolation level the will protect against nonrepeatable reads?A) check out CommittedB) SerializableC) review UncommittedD) atomic ReadE) Repeatable Read
Which the the following is not true of database recovery v reprocessing?A) Reprocessing renders use that a database save.B) Reprocessing bring away the exact same amount that time as did handling in the very first place.C) Reprocessing will constantly return the database come its specific previous state.D) Reprocessing requires a record of all transactions due to the fact that the last time the database to be saved.E) all of the over are true of reprocessing.
The recovery method in i beg your pardon the database is returned to a well-known state and also then all valid transactions room reapplied to the database is well-known as:A) reprocessing.B) rollback.C) transaction logging.D) rollforward.E) checkpointing.
A allude of synchronization between the database and also the transaction log in is dubbed a(n):A) before-image.B) after-image.C) recovery.D) checkpoint.E) nobody of the above
Additional DBA responsibilities include:A) problem and also error reporting.B) requests of changes to currently systems.C) managing database configuration.D) maintaining appropriate documentation.E) every one of the above
Computer systems fail for which of the adhering to reasons?A) Hardware breaks.B) electrical power fails.C) Programs have bugs.D) people make mistakes.E) every one of the above
When Microsoft access 2010 secures a database simply by save on computer the database in a reliable location, the database document will be a(n):A) *.accdb file.B) *.accdc file.C) *.accde file.D) *.mdb file.E) *.mdw file.
See more: Does Path Of Fire Come With Heart Of Thorns, Buying Path Of Fire When You Have Heart Of Thorns
When Microsoft access 2010 secures a database with simply a password, the database file will it is in a(n):A) *.accdb file.B) *.accdc file.C) *.accde file.D) *.mdb file.E) *.mdw file.
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, thomas H. Cormen