Managing Multiuser Databases The transaction log contains a copy of every database record (or page) after it has changed. These records are called before images. True False True False ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases Locks placed by the DBMS are called ________ . explicit locks implicit locks shared locks exclusive locks explicit locks implicit locks shared locks exclusive locks ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases Which of the following refers to a cursor type where changes of any type and from any source are visible? Dynamic Keyset Forward only Static Dynamic Keyset Forward only Static ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases The lost update problem is when User A reads data that have been processed by a portion of a transaction from User B. True False True False ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases The size of a lock is called: shared lock exclusive lock lock granularity implicit lock shared lock exclusive lock lock granularity implicit lock ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed. Read uncommitted Repeatable read Serializable Read committed Read uncommitted Repeatable read Serializable Read committed ANSWER DOWNLOAD EXAMIANS APP