A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.
A) record controller
B) exclusive lock
C) authorization rule
D) two-phase lock
D) two-phase lock
You might also like to view...
The ________ informs a user when entered data violates validation constraints
Fill in the blank(s) with the appropriate word(s).
A commercial software system that is completely finished, tested, and ready for implementation is called a
A. backbone system B. vendor-supported system C. benchmark system D. turnkey system
How is the total amount of potential risk calculated for a single asset and a specific threat?
A. SLE x EF B. Accumulate residual risk C. AV x EF x ARO D. AV x CCM - EF
A(n) ____________ is a mistake such as a misspelled keyword, a missing punctuation character, or the incorrect use of an operator.
a. parsed anomaly b. syntax error c. code bug d. illegal operation