Home / CSE / Database System 2 - CS :: Managing Multiuser Databases

CSE :: Database System 2 - CS

  1. Dirty read, nonrepeatable, and phantom reads are not possible in this instance.

  2. A.

     Read committed

    B.

     Read uncommitted

    C.

     Repeatable read

    D.

     Serializable


  3. A transaction in which either all of the database actions occur or none of them do is called:

  4. A.

     atomic.

    B.

     consistent.

    C.

     isolated.

    D.

     durable.


  5. A cursor type in which the application can only move forward through the recordset is called:

  6. A.

     forward only.

    B.

     static.

    C.

     keyset.

    D.

     dynamic.


  7. Which of the following occurs when one transaction reads a changed record that has not been committed to the database?

  8. A.

     Nonrepeatable read

    B.

     Phantom read

    C.

     Dirty read

    D.

     Consistent read


  9. Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?

  10. A.

     Read committed

    B.

     Read uncommitted

    C.

     Repeatable read

    D.

     Serializable


  11. Which of the following locks the item from access of any type?

  12. A.

     Implicit lock

    B.

     Explicit lock

    C.

     Exclusive lock

    D.

     Shared lock


  13. The size of a lock is called:

  14. A.

     implicit lock

    B.

     lock granularity

    C.

     exclusive lock

    D.

     shared lock


  15. A cursor type in which the application sees the data as they were at the time the cursor was opened is called:

  16. A.

     forward only

    B.

     static

    C.

     keyset

    D.

     dynamic


  17. What is the overall responsibility of the DBA?

  18. A.

     Facilitate the development and use of the database

    B.

     Create and populate tables

    C.

     Development, operation, and maintenance of the database and its applications

    D.

     Both the first and third answers above are correct.


  19. Locks placed by the DBMS are called ________ .

  20. A.

     implicit locks

    B.

     explicit locks

    C.

     exclusive locks

    D.

     shared locks