adplus-dvertising
frame-decoration

Question

Read only operations omit the _______ phase

a.

Read phase

b.

Validation phase

c.

Write phase

d.

None of the mentioned

Posted under DBMS

Answer: (c).Write phase

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Read only operations omit the _______ phase

Similar Questions

Discover Related MCQs

Q. Which of the following timestamp is used to record the time at which the transaction started execution?

Q. Which of the following timestamps is used to record the time when a transaction has finished its read phase?

Q. Which of the following timestamps is used to record the time when a database has completed its write operation?

Q. State true or false: Locking and timestamp ordering force a wait or rollback whenever a conflict is detected.

Q. State true or false: We determine the serializability order of validation protocol by the validation ordering technique

Q. In _______ schemes, each write operation creates a new version of Q

Q. If the first update is overwritten by a second, it is called as a _______ update

Q. State true or false: Snapshot isolation prevents lost updates

Q. Which of the following is a variant of snapshot isolation

Q. Under ________ the system uses locking mechanism that applies only to updates

Q. The situation in which each pair of transactions has read a data written by the other, but there is no data written by the transactions is called as _______

Q. Oracle uses __________ for the serializable isolation level

Q. State true or false: Snapshot isolation has low overhead

Q. In ________ no two aborts occur unless two concurrent transactions update the same data item.

Q. Which of the following transactions can multiversion two phase locking protocol not differentiate.

Q. ________ deletes a data item from a database

Q. Which of the following does not lock the entire index

Q. Which of the following is included in the operational mechanism of the index locking protocol?

Q. _________ is a form of two degree consistency designed for programs that iterate over tuples of a relation by using cursors.

Q. Transactions that involve user interactions are called __________