1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
4 years ago
8

What is a rule that applies to the two-phase locking protocol. a. two transaction cannot have conflicting lock. b. no unlock ope

ration can precede a lock operation in a different transaction. c. no data is affected until all locks are released. d. no data is affected until the transaction is in its locked position
Social Studies
1 answer:
Angelina_Jolie [31]4 years ago
7 0

Answer:

B. no unlock operation can precede a lock operation in a different transaction.

You might be interested in
Which of the following statements about volcanic eruptions is true?
Nana76 [90]

Answer:

C

Explanation:

5 0
3 years ago
Read 2 more answers
Which type of long-term memory is most difficult to bring into conscious awareness?
Tanya [424]
Procedural memories
6 0
3 years ago
Which type of systems have more accountability in terms of holding politicians responsible for corruption
ANEK [815]
Majoritarian democracies
5 0
3 years ago
Which search pattern would be primarily be used for a large outdoor crime scene?
trapecia [35]

Answer:

Strip-search crime scene patterns are ideal for investigating large areas. This technique is executed by the investigators beginning at one end of the search area and continuing forward in the same direction. Spiral searches are often used to find a particular object at a crime scene.

4 0
2 years ago
What type of attack intercepts legitimate communication and forges a fictitious response to the sender?
maks197457 [2]

Answer:

Man in the middle attack(MITM)

Explanation:

This a term popular with hackers in computer and cybersecurity fields. The man in the middle attack describes a situation whereby there is an in-between in the perceived private conversation of two persons online. The middle man acts like an intermediary between these two, eavesdropping on each others conversation and controlling it while making it look as though they are having a private cyber conversation.

7 0
3 years ago
Other questions:
  • An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. whic
    11·1 answer
  • Perceived fairness in the outcomes we receive relative to our contributions and the outcomes and contributions of others is call
    14·1 answer
  • A member of this family of hydrous alumino-silicate minerals is generally referred to as a _______.
    7·1 answer
  • In a variation of his standard experiment, solomon asch (1957) found that when participants could write their responses on a pie
    10·1 answer
  • What role did slavery play in the mercantile system?
    11·1 answer
  • If aggregate output is below the natural rate level, activists of policies would recommend that the government a. do nothing. b.
    5·1 answer
  • Does anyone have an idea of how I could draw the sons and daughters of liberty (British’s point of view) in an editorial cartoon
    13·1 answer
  • U.S. Civics:
    9·1 answer
  • Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of _____ knowle
    8·2 answers
  • Exclusive rights to make or sell Exclusive rights to make or sell inventions
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!