2. Which of the following locks the item from change but not from read?
3. Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?
4. A transaction for which all committed changes are permanent is called:
5. In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed.
6. Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction?
7. The advantage of optimistic locking is that:
8. Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?
9. Which of the following refers to a cursor type where changes of any type and from any source are visible?
10. Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads?
11. Dirty read, nonrepeatable, and phantom reads are not possible in this instance.
12. A transaction in which either all of the database actions occur or none of them do is called:
13. A cursor type in which the application can only move forward through the recordset is called:
14. Which of the following occurs when one transaction reads a changed record that has not been committed to the database?
15. Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?
16. Which of the following locks the item from access of any type?
17. The size of a lock is called:
18. A cursor type in which the application sees the data as they were at the time the cursor was opened is called:
19. What is the overall responsibility of the DBA?
20. Locks placed by the DBMS are called ________ .
21. Resource locking is a process to prevent multiple applications from obtaining copies of the same record when the record is about to be changed.
22. The overall responsibility of the DBA is to facilitate the development and use of the database.
23. The size of the lock is referred to as the lock granularity.
24. A durable transaction is one in which all committed changes are permanent.
25. An ACID transaction is one that is atomic, consistent isolated, and durable.
26. When one transaction reads a changed record that has not been committed to the database a filthy read occurs.
27. The size of a lock is referred to as lock sizing.
28. When two transactions are being processed against the database at the same time they are termed concurrent transactions.
29. Locks placed by the DBMS are explicit locks.
30. In optimistic locking, the assumption is made that conflict will occur.
31. Two transactions that run concurrently and generate results that are consistent with the results that would have occurred if they had run separately are referred to as serializable transactions.
32. The lost update problem is when User A reads data that have been processed by a portion of a transaction from User B.
33. The transaction log contains a copy of every database record (or page) after it has changed. These records are called before images.
34. Database administration refers to a function that applies to the entire organization.
35. Locks placed by command are implicit locks.
36. The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times.
37. A phantom read occurs when a transaction rereads data it has previously read and finds modifications or deletions caused by a committed transaction.
38. A transaction is a series of actions to be taken on the database so that either all of them are performed successfully or none of them are performed at all.
39. A point of synchronization between the database and the transaction log is generally referred to as a stop point.
40. An exclusive lock locks the item from change but not from read.