adplus-dvertising
frame-decoration

Question

Oracle uses __________ for the serializable isolation level

a.

Multiversion scheme

b.

Timestamp protocol

c.

Lock based protocol

d.

Snapshot isolation

Posted under DBMS

Answer: (d).Snapshot isolation

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Oracle uses __________ for the serializable isolation level

Similar Questions

Discover Related MCQs

Q. State true or false: Snapshot isolation has low overhead

Q. In ________ no two aborts occur unless two concurrent transactions update the same data item.

Q. Which of the following transactions can multiversion two phase locking protocol not differentiate.

Q. ________ deletes a data item from a database

Q. Which of the following does not lock the entire index

Q. Which of the following is included in the operational mechanism of the index locking protocol?

Q. _________ is a form of two degree consistency designed for programs that iterate over tuples of a relation by using cursors.

Q. Transactions that involve user interactions are called __________

Q. State true or false: Key value locking provides increased concurrency

Q. To prevent the phantom phenomenon, _______ is used

Q. Which of the following does cursor stability ensure

Q. State true or false: Exclusive locks are held until transaction commit in degree two consistency

Q. In order to maintain transactional integrity and database consistency, what technology does a DBMS deploy?

Q. Which of the following are introduced to reduce the overheads caused by the log-based recovery?

Q. Which of the following protocols ensures conflict serializability and safety from deadlocks?

Q. Which of the following is the block that is not permitted to be written back to the disk?

Q. If transaction Ti gets an explicit lock on the file Fc in exclusive mode, then it has an__________ on all the records belonging to that file.

Q. Which refers to a property of computer to run several operation simultaneously and possible as computers await response of each other

Q. All lock information is managed by a __________ which is responsible for assigning and policing the locks used by the transactions.

Q. The ____ lock allows concurrent transactions to access the same row as long as they require the use of different fields within that row.