Question 1 :
Locks placed by command are called ________ .
Question 2 :
Which of the following locks the item from change but not from read?
Question 3 :
Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?
Question 4 :
A transaction for which all committed changes are permanent is called:
Question 5 :
In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed.
Question 6 :
Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction?
Question 7 :
The advantage of optimistic locking is that:
Question 8 :
Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?
Question 9 :
Which of the following refers to a cursor type where changes of any type and from any source are visible?
Question 10 :
Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads?
Question 11 :
Dirty read, nonrepeatable, and phantom reads are not possible in this instance.
Question 12 :
A transaction in which either all of the database actions occur or none of them do is called:
Question 13 :
A cursor type in which the application can only move forward through the recordset is called:
Question 14 :
Which of the following occurs when one transaction reads a changed record that has not been committed to the database?
Question 15 :
Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?
Question 16 :
Which of the following locks the item from access of any type?
Question 17 :
The size of a lock is called:
Question 18 :
A cursor type in which the application sees the data as they were at the time the cursor was opened is called:
Question 19 :
What is the overall responsibility of the DBA?
Question 20 :
Locks placed by the DBMS are called ________ .