Transaction-based logging reduces the risk of data loss by using ________ transactions, which perform a group of operations in their entirety, or not at all.

a) shadow
b) virtual
c) exclusive
d) atomic


d) atomic

Computer Science & Information Technology

You might also like to view...

You have just installed an internal ODD. When you open Windows Explorer/File Explorer, no drive letter is assigned to the drive. What will you do next?

A) Replace the drive. B) Partition the drive. C) Format the drive. D) Check cables and possibly jumpers. E) Replace the cable.

Computer Science & Information Technology

________ Control is a feature that was designed to protect your computer from unauthorized changes. It is designed to enable all users, even administrators, to run with a standard access token

a. Admin b. MakeChange c. User Account d. Psoconfig

Computer Science & Information Technology

The ____ statement is used to take away privileges from an existing user account for a specified table or database.

A. REMOVE B. DROP C. DELETE D. REVOKE

Computer Science & Information Technology

?Hiding nonessential content in the mobile viewport minimizes _____.

A. ?scrolling B. ?clicking C. ?hashing D. ?indexing

Computer Science & Information Technology