Q.1

Which of the following locks the item from access of any type?

  • Implicit lock
  • Explicit lock
  • Exclusive lock
  • Shared lock
Q.2

Locks placed by the DBMS are explicit locks.

  • True
  • False
Q.3

In optimistic locking, the assumption is made that conflict will occur.

  • True
  • False
Q.4

The advantage of optimistic locking is that:

  • the lock is obtained only after the transaction has processed.
  • the lock is obtained before the transaction has processed.
  • the lock never needs to be obtained.
  • transactions that are best suited are those with a lot of activity.
Q.5

Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?

  • Forward only
  • Static
  • Keyset
  • Dynamic
Q.6

A transaction in which either all of the database actions occur or none of them do is called:

  • atomic.
  • consistent.
  • isolated.
  • durable.
Q.7

The size of a lock is called:

  • implicit lock.
  • lock granularity.
  • exclusive lock.
  • shared lock.
Q.8

A cursor type in which the application sees the data as they were at the time the cursor was opened is called:

  • forward only.
  • static.
  • keyset.
  • dynamic.
Q.9

Which of the following refers to a cursor type where changes of any type and from any source are visible?

  • Forward only
  • Static
  • Keyset
  • Dynamic
Q.10

A cursor type in which the application can only move forward through the recordset is called:

  • forward only.
  • static.
  • keyset.
  • dynamic.
Q.11

What is the overall responsibility of the DBA?

  • Facilitate the development and use of the database
  • Create and populate tables
  • Development, operation, and maintenance of the database and its applications
  • Both the first and third answers above are correct.
Q.12

Locks placed by command are called ________ .

  • implicit locks
  • explicit locks
  • exclusive locks
  • shared locks
Q.13

Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads?

  • Read committed
  • Read uncommitted
  • Repeatable read
  • Serializable
Q.14

Which of the following occurs when one transaction reads a changed record that has not been committed to the database?

  • Nonrepeatable read
  • Phantom read
  • Dirty read
  • Consistent read
Q.15

Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?

  • Read committed
  • Read uncommitted
  • Repeatable read
  • Serializable
Q.16

Locks placed by the DBMS are called ________ .

  • implicit locks
  • explicit locks
  • exclusive locks
  • shared locks
Q.17

Which of the following locks the item from change but not from read?

  • Implicit lock
  • Explicit lock
  • Exclusive lock
  • Shared lock
Q.18

Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?

  • Nonrepeatable read
  • Phantom read
  • Dirty read
  • Consistent read
Q.19

A transaction for which all committed changes are permanent is called:

  • atomic.
  • consistent.
  • isolated.
  • durable.
Q.20

In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed.

  • Read committed
  • Read uncommitted
  • Repeatable read
  • Serializable
0 h : 0 m : 1 s