Managing Multiuser Databases Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur? Read uncommitted Read committed Serializable Repeatable read Read uncommitted Read committed Serializable Repeatable read ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases The size of a lock is called: lock granularity shared lock implicit lock exclusive lock lock granularity shared lock implicit lock exclusive lock ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases Which of the following refers to a cursor type where changes of any type and from any source are visible? Forward only Keyset Dynamic Static Forward only Keyset Dynamic Static ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases Which of the following locks the item from access of any type? Shared lock Explicit lock Implicit lock Exclusive lock Shared lock Explicit lock Implicit lock Exclusive lock ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases The transaction log contains a copy of every database record (or page) after it has changed. These records are called before images. True False True False ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row? Dynamic Keyset Forward only Static Dynamic Keyset Forward only Static ANSWER DOWNLOAD EXAMIANS APP