Question
a.
Intention lock modes
b.
shared and intention-exclusive (SIX) mode
c.
Intention-exclusive (IX) mode
d.
Intention-shared (IS) mode
Posted under DBMS
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. If a node is locked in ______________ the subtree rooted by that node is locked explicitly in shared mode, and that explicit locking is being done at a lower level with...
Similar Questions
Discover Related MCQs
Q. ____________ denotes the largest timestamp of any transaction that executed write(Q) successfully.
View solution
Q. The _____________ ensures that any conflicting read and write operations are executed in timestamp order.
View solution
Q. The __________ requires that each transaction Ti executes in two or three different phases in its lifetime, depending on whether it is a read-only or an update transaction.
View solution
Q. This validation scheme is called the _________ scheme since transactions execute optimistically, assuming they will be able to finish execution and validate at the end.
View solution
Q. The most recent version of standard SQL prescribed by the American National Standards Institute is
View solution
Q. ANSI-standard SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value is null is
View solution
Q. A lock that prevents the use of any tables in the database from one transaction while another transaction is being processed is called a
View solution
Q. A condition that occurs when two transactions wait for each other to unlock data is known as a(n)
View solution
Q. Which of the following is not true about B+ trees?
View solution
Q. The extent of the database resource that is included with each lock is called the level of
View solution
Q. Snapshot isolation is a particular type of ______________ scheme.
View solution
Q. Snapshot isolation is used to give
View solution
Q. Lost update problem is
View solution
Q. Under first updater wins the system uses a __________ mechanism that applies only to updates.
View solution
Q. When a transaction Ti attempts to update a data item, it requests a _________ on that data item.
View solution
Q. Each of a pair of transactions has read data that is written by the other, but there is no data written by both transactions, is referred to as
View solution
Q. An application developer can guard against certain snapshot anomalies by appending a ______ clause to the SQL select query.
View solution
Q. Evaluate the CREATE TABLE statement:
CREATE TABLE products
(product_id NUMBER(6) CONSTRAINT prod_id_pk PRIMARY KEY, product_name VARCHAR2(15));
Which statement is true regarding the PROD_ID_PK constraint?
View solution
Q. Evaluate the following CREATE SEQUENCE statement:
CREATE SEQUENCE seq1
START WITH 100
INCREMENT BY 10
MAXVALUE 200
CYCLE
NOCACHE;
The sequence SEQ1 has generated numbers up to the maximum limit of 200. You issue the following SQL statement:
SELECT seq1.nextval FROM dual;
What is displayed by the SELECT statement?
View solution
Q. The method of access that uses key transformation is called as
View solution
Suggested Topics
Are you eager to expand your knowledge beyond DBMS? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!