____ ensures that once transaction changes are done, they cannot be undone or lost, even in the event of a system failure. ( ) Atomicity ( ) Consistency ( ) Durability ( ) Isolation 2. In this technique, deadlock is handled through request time out whenever a transaction that requests a lock has not been granted the lock for a system-defined period of time. What is this technique? ( ) Timeouts. ( ) Wait-die timestamps. ( ) Wound-wait timestamps. ( ) Wait-for-graph. 3. This concurrency problem occurs when one transaction T2 can see intermediate results of another transaction T1 before T1 has been committed. What is this problem? ( ) Lost update problem. ( ) Uncommitted dependency problem. ( ) Inconsistent analysis problem. ( ) Unrepeatable read problem. 4.A(n) ____ lock exists when concurrent transactions are granted Read access on the basis of a common lock. ( ) binary ( ) field-level ( ) shared ( ) exclusive 5.Which of the following is an integrity constraint in the logical data model? ( ) Required data. ( ) Attribute domain constraints ( ) Referential integrity. ( ) All of the above.
- ____ ensures that once transaction changes are done, they cannot be undone or lost, even in the event of a system failure.
( ) Atomicity
( ) Consistency
( ) Durability
( ) Isolation
2. In this technique, deadlock is handled through request time out whenever a transaction that requests a lock has not been granted the lock for a system-defined period of time. What is this technique?
( ) Timeouts.
( ) Wait-die timestamps.
( ) Wound-wait timestamps.
( ) Wait-for-graph.
3. This concurrency problem occurs when one transaction T2 can see intermediate results of another transaction T1 before T1 has been committed. What is this problem?
( ) Lost update problem.
( ) Uncommitted dependency problem.
( ) Inconsistent analysis problem.
( ) Unrepeatable read problem.
4.A(n) ____ lock exists when concurrent transactions are granted Read access on the basis of a common lock.
( ) binary
( ) field-level
( ) shared
( ) exclusive
5.Which of the following is an integrity constraint in the logical data model?
( ) Required data.
( ) Attribute domain constraints
( ) Referential integrity.
( ) All of the above.
Trending now
This is a popular solution!
Step by step
Solved in 7 steps