document16

8
1. Locks placed by command are called ________ . A. implicit locks B. explicit locks C. exclusive locks D. shared locks Answer & Explanation Answer: Option B Explanation: No answer description available for this question. Let us discuss. View Answer Workspace Report Discuss in Forum 2. Which of the following locks the item from change but not from read? A. Implicit lock B. Explicit lock C. Exclusive lock D. Shared lock Answer & Explanation Answer: Option D Explanation: No answer description available for this question. Let us discuss. View Answer Workspace Report Discuss in Forum 3. Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read? A. Nonrepeatable read B. Phantom read C. Dirty read D. Consistent read

Upload: printesh-patel

Post on 02-Oct-2015

212 views

Category:

Documents


0 download

DESCRIPTION

oracle database administration

TRANSCRIPT

1.Locks placed by command are called ________ .

A.implicit locks

B.explicit locks

C.exclusive locks

D.shared locks

Answer & ExplanationAnswer:OptionBExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

2.Which of the following locks the item from change but not from read?

A.Implicit lock

B.Explicit lock

C.Exclusive lock

D.Shared lock

Answer & ExplanationAnswer:OptionDExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

3.Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?

A.Nonrepeatable read

B.Phantom read

C.Dirty read

D.Consistent read

Answer & ExplanationAnswer:OptionBExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

4.A transaction for which all committed changes are permanent is called:

A.atomic.B.consistent.

C.isolated.D.durable.

Answer & ExplanationAnswer:OptionDExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

5.In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed.

A.Read committed

B.Read uncommitted

C.Repeatable read

D.Serializable

Answer & ExplanationAnswer:OptionA

6.Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction?

A.Nonrepeatable read

B.Phantom read

C.Dirty read

D.Consistent read

Answer & ExplanationAnswer:OptionAExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

7.The advantage of optimistic locking is that:

A.the lock is obtained only after the transaction has processed.

B.the lock is obtained before the transaction has processed.

C.the lock never needs to be obtained.

D.transactions that are best suited are those with a lot of activity.

Answer & ExplanationAnswer:OptionAExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

8.Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?

A.Forward only

B.Static

C.Keyset

D.Dynamic

Answer & ExplanationAnswer:OptionCExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

9.Which of the following refers to a cursor type where changes of any type and from any source are visible?

A.Forward only

B.Static

C.Keyset

D.Dynamic

Answer & ExplanationAnswer:OptionDExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

10.Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads?

A.Read committed

B.Read uncommitted

C.Repeatable read

D.Serializable

Answer & ExplanationAnswer:OptionC

11.Dirty read, nonrepeatable, and phantom reads are not possible in this instance.

A.Read committed

B.Read uncommitted

C.Repeatable read

D.Serializable

Answer & ExplanationAnswer:OptionDExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

12.A transaction in which either all of the database actions occur or none of them do is called:

A.atomic.B.consistent.

C.isolated.D.durable.

Answer & ExplanationAnswer:OptionAExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

13.A cursor type in which the application can only move forward through the recordset is called:

A.forward only.

B.static.

C.keyset.

D.dynamic.

Answer & ExplanationAnswer:OptionAExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

14.Which of the following occurs when one transaction reads a changed record that has not been committed to the database?

A.Nonrepeatable read

B.Phantom read

C.Dirty read

D.Consistent read

Answer & ExplanationAnswer:OptionCExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

15.Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?

A.Read committed

B.Read uncommitted

C.Repeatable read

D.Serializable

Answer & ExplanationAnswer:OptionB

16.Which of the following locks the item from access of any type?

A.Implicit lock

B.Explicit lock

C.Exclusive lock

D.Shared lock

Answer & ExplanationAnswer:OptionCExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

17.The size of a lock is called:

A.implicit lock.

B.lock granularity.

C.exclusive lock.

D.shared lock.

Answer & ExplanationAnswer:OptionBExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

18.A cursor type in which the application sees the data as they were at the time the cursor was opened is called:

A.forward only.

B.static.

C.keyset.

D.dynamic.

Answer & ExplanationAnswer:OptionBExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

19.What is the overall responsibility of the DBA?

A.Facilitate the development and use of the database

B.Create and populate tables

C.Development, operation, and maintenance of the database and its applications

D.Both the first and third answers above are correct.

Answer & ExplanationAnswer:OptionDExplanation:No answer description available for this question.Let us discuss.View AnswerWorkspaceReportDiscuss in Forum

20.Locks placed by the DBMS are called ________ .

A.implicit locks

B.explicit locks

C.exclusive locks

D.shared locks

Answer & ExplanationAnswer:OptionA