Question
a.
Start(i)
b.
Validation(i)
c.
Finish(i)
d.
Write(i)
Posted under DBMS
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of the following timestamps is used to record the time when a database has completed its write operation?
Similar Questions
Discover Related MCQs
Q. State true or false: Locking and timestamp ordering force a wait or rollback whenever a conflict is detected.
View solution
Q. State true or false: We determine the serializability order of validation protocol by the validation ordering technique
View solution
Q. In _______ schemes, each write operation creates a new version of Q
View solution
Q. If the first update is overwritten by a second, it is called as a _______ update
View solution
Q. State true or false: Snapshot isolation prevents lost updates
View solution
Q. Which of the following is a variant of snapshot isolation
View solution
Q. Under ________ the system uses locking mechanism that applies only to updates
View solution
Q. The situation in which each pair of transactions has read a data written by the other, but there is no data written by the transactions is called as _______
View solution
Q. Oracle uses __________ for the serializable isolation level
View solution
Q. State true or false: Snapshot isolation has low overhead
View solution
Q. In ________ no two aborts occur unless two concurrent transactions update the same data item.
View solution
Q. Which of the following transactions can multiversion two phase locking protocol not differentiate.
View solution
Q. ________ deletes a data item from a database
View solution
Q. Which of the following does not lock the entire index
View solution
Q. Which of the following is included in the operational mechanism of the index locking protocol?
View solution
Q. _________ is a form of two degree consistency designed for programs that iterate over tuples of a relation by using cursors.
View solution
Q. Transactions that involve user interactions are called __________
View solution
Q. State true or false: Key value locking provides increased concurrency
View solution
Q. To prevent the phantom phenomenon, _______ is used
View solution
Q. Which of the following does cursor stability ensure
View solution
Suggested Topics
Are you eager to expand your knowledge beyond DBMS? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!