The term DBA refers to the:A) database accessor.B) database auditor.C) data organization auditor.D) database administrator.E) information organization administrator.

You are watching: Which of the following is true about a shared lock?


Which of the following is not a method of processing databases?A) Web applications making use of ASPB) Web applications making use of JSPC) Applications invoking stored proceduresD) Programs coded in C#E) All of the above are means of handling a database.
The purpose of concurrency control is to:A) ensure that each form has a equivalent report.B) ensure that ASPs execute not duplicate JSPs.C) encertain that one user"s work does not interfere via another"s.D) encertain that stored procedures do not invoke triggers.E) ensure that triggers execute not invoke stored procedures.
When a transaction functions in such a means that either all of the transactivity actions are completed or none will certainly be, the transactivity is shelp to be:A) consistent.B) isolated.C) atomic.D) locked.E) logical.
What concurrent handling problem occurs as soon as a transaction rereads data and finds brand-new rows that were put by a various transaction because the prior read?A) Nonrepeatable readsB) Phantom readsC) Dirty readsD) Serialized readsE) Unlocked reads
What conexisting processing trouble occurs as soon as a transaction reads a changed record that has actually not been committed to the database?A) Nonrepeatable readsB) Phantom readsC) Dirty readsD) Serialized readsE) Unlocked reads
Preventing multiple applications from obtaining copies of the exact same document as soon as the record is about to adjusted is called:A) serialized analysis.B) shed updating.C) conpresent processing.D) reresource locking.E) block factoring.
Whether a lock uses to information at the record level, page level, table level, or database level is referred to as:A) lock exclusivity.B) lock sharing.C) lock phasing.D) serializable locking.E) lock granularity.
Which of the following is true about a common lock?A) It is more restrictive than an implicit lock.B) It permits only two transactions to update a record concurrently.C) It locks the item from all accessibility.D) It allows reads to the locked item.E) It should use a two-phase locking scheme.
Which form of lock assumes that no conflicts will occur?A) Optimistic locksB) Granular locksC) Explicit locksD) Shared locksE) Open locks
An ACID transactivity is one that is:A) atomic.B) consistent.C) isolated.D) durable.E) All of the above
Ensuring that each SQL statement individually procedures constant rows is well-known as:A) transaction level consistency.B) independent consistency.C) statement level consistency.D) process level consistency.E) serializable consistency.
What is the leastern restrictive isolation level that will certainly proccasion phantom check out problems?A) Read CommittedB) SerializableC) Read UncommittedD) Atomic ReadE) Repeatable Read
What is the leastern restrictive isolation level that will prevent dirty reads?A) Read CommittedB) SerializableC) Read UncommittedD) Atomic ReadE) Repeatable Read
What is the least restrictive isolation level that will certainly proccasion nonrepeatable reads?A) Read CommittedB) SerializableC) Read UncommittedD) Atomic ReadE) Repeatable Read
Which of the complying with is not true of database recoextremely with reprocessing?A) Reprocessing makes usage of a database conserve.B) Reprocessing takes the same amount of time as did handling in the initially place.C) Rehandling will constantly return the database to its specific previous state.D) Rehandling needs a record of all transactions considering that the last time the database was conserved.E) All of the over are true of rehandling.
The recovery approach in which the database is returned to a well-known state and then all valid transactions are reapplied to the database is well-known as:A) reprocessing.B) rollago.C) transactivity logging.D) rollforward.E) checkpointing.
A point of synchronization in between the database and also the transactivity log is dubbed a(n):A) before-image.B) after-photo.C) recoexceptionally.D) checkallude.E) None of the above
Further DBA responsibilities include:A) difficulty and also error reporting.B) researches of changes to existing systems.C) regulating database configuration.D) preserving appropriate documentation.E) All of the above
Computer devices fail for which of the adhering to reasons?A) Hardware breaks.B) Electrical power stops working.C) Programs have actually bugs.D) People make mistakes.E) All of the above
When Microsoft Access 2010 secures a database simply by storing the database in a trusted place, the database file will be a(n):A) *.accdb file.B) *.accdc file.C) *.accde file.D) *.mdb file.E) *.mdw file.

See more: Why Are Many Entrepreneurs Uncomfortable On A Relaxing Vacation?


When Microsoft Access 2010 secures a database through just a password, the database file will certainly be a(n):A) *.accdb file.B) *.accdc file.C) *.accde file.D) *.mdb file.E) *.mdw file.
})}else;window.location.assign("https://soimg.org/explanations/textbook-solutions/introduction-to-the-theory-of-computation-3rd-edition-9781133187790");">
*

})}else;home window.location.assign("https://soimg.org/explanations/textbook-solutions/introduction-to-algorithms-3rd-edition-9780262033848");">

Overview to Algorithmsthird EditionCharles E. Leiserboy, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
})}else;home window.area.assign("https://soimg.org/explanations/textbook-solutions/engineering-electromagnetics-8th-edition-9780077418823");">
*

})}else;home window.place.assign("https://soimg.org/explanations/textbook-solutions/operating-system-concepts-9th-edition-9781118129388");">
*