Locks placed by command are implicit locks.
Answer: B
No answer description available for this question.
Enter details here
The size of a lock is referred to as lock sizing.
Answer: B
No answer description available for this question.
Enter details here
A cursor type in which the application sees the data as they were at the time the cursor was opened is called:
Answer: B
No answer description available for this question.
Enter details here
Locks placed by command are called ________ .
Answer: B
No answer description available for this question.
Enter details here
Locks placed by the DBMS are called ________ .
Answer: A
No answer description available for this question
Enter details here
Money is defined in Oracle with the Currency data type.
Answer: B
No answer description available for this question.
Enter details here
An ACID transaction is one that is atomic, consistent isolated, and durable.
Answer: A
No answer description available for this question
Enter details here
A point of synchronization between the database and the transaction log is generally referred to as a stop point.
Answer: B
No answer description available for this question.
Enter details here
Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads?
Answer: C
No answer description available for this question.
Enter details here
Locks placed by the DBMS are explicit locks.
Answer: B
No answer description available for this question.
Enter details here