Question 1229 – Nielit STA [02-12-2018]
November 5, 2023OOPS
November 5, 2023Database-Management-System
Question 791
|
To maintain transactional integrity and database consistency DBMS will use:
Triggers
|
|
Cursors
|
|
Locks
|
|
Pointers
|
Question 791 Explanation:
→ Locks are used to maintain transactional integrity and database consistency.
→ Concurrency control protocols can be broadly divided into two categories:
1.Lock based protocols
2.Timestamp based protocols
→ Concurrency control protocols can be broadly divided into two categories:
1.Lock based protocols
2.Timestamp based protocols
Correct Answer: C
Question 791 Explanation:
→ Locks are used to maintain transactional integrity and database consistency.
→ Concurrency control protocols can be broadly divided into two categories:
1.Lock based protocols
2.Timestamp based protocols
→ Concurrency control protocols can be broadly divided into two categories:
1.Lock based protocols
2.Timestamp based protocols
Subscribe
Login
0 Comments