A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

A) record controller
B) exclusive lock
C) authorization rule
D) two-phase lock


D) two-phase lock

Computer Science & Information Technology

You might also like to view...

The ________ informs a user when entered data violates validation constraints

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A commercial software system that is completely finished, tested, and ready for implementation is called a

A. backbone system B. vendor-supported system C. benchmark system D. turnkey system

Computer Science & Information Technology

How is the total amount of potential risk calculated for a single asset and a specific threat?

A. SLE x EF B. Accumulate residual risk C. AV x EF x ARO D. AV x CCM - EF

Computer Science & Information Technology

A(n) ____________ is a mistake such as a misspelled keyword, a missing punctuation character, or the incorrect use of an operator.

a. parsed anomaly b. syntax error c. code bug d. illegal operation

Computer Science & Information Technology