Managing Multiuser Databases The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times. True False True False ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases The size of a lock is called: implicit lock shared lock lock granularity exclusive lock implicit lock shared lock lock granularity exclusive lock ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases A transaction in which either all of the database actions occur or none of them do is called: durable. consistent. isolated. atomic. durable. consistent. isolated. atomic. ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases A cursor type in which the application sees the data as they were at the time the cursor was opened is called: keyset forward only dynamic static keyset forward only dynamic static ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases Dirty read, nonrepeatable, and phantom reads are not possible in this instance. Serializable Read uncommitted Repeatable read Read committed Serializable Read uncommitted Repeatable read Read committed ANSWER DOWNLOAD EXAMIANS APP
Managing Multiuser Databases Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read? Nonrepeatable read Dirty read Phantom read Consistent read Nonrepeatable read Dirty read Phantom read Consistent read ANSWER DOWNLOAD EXAMIANS APP