The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times.
Answer: A
No answer description available for this question.
Enter details here
Which of the following refers to a cursor type where changes of any type and from any source are visible?
Answer: D
No answer description available for this question.
Enter details here
Resource locking is a process to prevent multiple applications from obtaining copies of the same record when the record is about to be changed.
Answer: A
No answer description available for this question.
Enter details here
An exclusive lock locks the item from change but not from read.
Answer: B
No answer description available for this question.
Enter details here
Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?
Answer: B
No answer description available for this question.
Enter details here
The size of a lock is called:
Answer: B
No answer description available for this question.
Enter details here
In optimistic locking, the assumption is made that conflict will occur.
Answer: B
No answer description available for this question.
Enter details here
Database administration refers to a function that applies to the entire organization.
Answer: B
No answer description available for this question.
Enter details here
A durable transaction is one in which all committed changes are permanent.
Answer: A
No answer description available for this question.
Enter details here
When one transaction reads a changed record that has not been committed to the database a filthy read occurs.
Answer: B
No answer description available for this question.
Enter details here