Row-level locking is used to ensure that, when two users are editing a table, they cannot edit the same row, record, of data. This is not compatible in a(n) ________ database
A) encrypted
B) decrypted
C) secured
D) shared
A
You might also like to view...
All of the following are methods of the ArrayList class except:
a. length() b. size() c. set() d. get()
A _________ is a collection of related data.
A) ?record ? B) ?file ? C) ?database ? D) ?field
(Bubble Sort Enhancements) The bubble sort described in Exercise 6.11 is inefficient for large arrays. Make the following simple modifications to improve the performance of the bubble sort:
a) After the first pass, the largest number is guaranteed to be in the highest-numbered element of the array; after the second pass, the two highest numbers are “in place,” and so on. Instead of making nine comparisons on every pass, modify the bubble sort to make eight comparisons on the second pass, seven on the third pass, and so on. b) The data in the array may already be in the proper order or near-proper order, so why make nine passes if fewer will suffice? Modify the sort to check at the end of each pass if any swaps have been made. If none have been made, then the data must already be in the proper order, so the program should terminate. If swaps have been made, then at least one more pass is needed.
Which of the following is not an example of good FTP server security?
A. Disable the anonymous FTP account. B. Use port 21. C. Change passwords regularly. D. Scan PHP files.