Which of the following cannot be enforced in the DBMS or application programs?
A) Processing rights
B) Security
C) Processing responsibilities
D) Cursors
E) Transaction isolation
Correct Answer:
Verified
Q92: Briefly define the four isolation levels and
Q93: Which of the following would not be
Q94: Once processing rights have been defined,they may
Q95: Which are more commonly used: implicit or
Q96: Which of the following is not true
Q98: Distinguish between the four cursor types.
Q99: Briefly explain the strategy of two-phased locking.
Q100: Which of the following is not true
Q101: Explain the purpose of transaction logs and
Q102: Discuss the DBMS security model.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents