1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saw5 [17]
3 years ago
15

The ____ command can be used to view the contents of a record when it is anticipated that the record will need to be modified. I

t places a shared lock on the record(s) to be changed and prevents any other user from acquiring a lock on the same record(s).
A) SELECT...LOCK TABLE
B) COMMIT...LOCK TABLE
C) SELECT...FOR UPDATE
D) COMMIT...FOR UPDATE
Computers and Technology
1 answer:
GREYUIT [131]3 years ago
6 0

Answer:

The correct answer is B)

Explanation:

The commit command allows us to:

• Consolidate, confirm

• committing refers to the idea of confirming a set of provisional changes permanently.

• A popular use is at the end of a database transaction.

•

The LOCK TABLE command should be used:

• when a lock of the mode specified in the table can be acquired.

• The command will wait for everything you need to get the lock,

• In case you cannot acquire the lock immediately, the NOWAIT option is specified so that the command cancels the transaction.

You might be interested in
Which one is not an operating system?1.mac 2.Microsoft office3.Iso.3.Android
quester [9]
It's either microsoft or office. Based on research I would say office.

I really hope this helps you! :-)
6 0
3 years ago
Which commas is used to combine two or more cells together into one cell
AURORKA [14]
The command is Merge & Center
This command could be easily found in the toolbar of your excel.
If you execute this command in two different cells, those cells will be merged into one larger cell and the content in that cells will be placed exactly in the middle of the combined cell (measures according to combined cells' length)
5 0
3 years ago
You are assigned by your teacher to perform the assembly of all the parts of the computer in preparation for the hands on activi
Alexus [3.1K]

Answer:

answer it yourself or ask your teacker

Explanation:

7 0
2 years ago
What server role provides IEEE 802.1X authentication features? (Points : 5) File services
Citrus2011 [14]

Answer:Network policy and access services

Explanation: IEEE 802.1X is standard which stands for Port-based Network access control (PNAC). The authentication process of IEEE 802.1X is accessing should be managed through server, presence security factor , policies of network are managed and supported by network policy server .

The device that want to be connected with LAN or wireless LAN get though this authentication process.Other options are incorrect because files services, web servers and active directory domain services are not the factor that considered for authentication in IEEE 802.1X.

7 0
3 years ago
Which kind of photography takes attractive photos of products to make them stand out?
CaHeK987 [17]

Answer:

See there are multiple ways to get a perfect shot of products to stand out but the most affective according to me are explained below :-

  • Macro shooting - These are close shots u can say really close just to show the product more attractive and u can see these types of shots in every advertisement.
  • Background shooting/shots - Opposite of macro shots.
  • 3d shots - These are 360° shots.

Tip :- Use wide aperture like F2 and right aperture for right shots.

Hope it helps!

3 0
3 years ago
Other questions:
  • What is the difference between an embedded image and an attached image
    7·2 answers
  • To combat piracy, many software publishers require users to type in a(n) ____ code, a sequence of numbers and letters in order t
    10·1 answer
  • What types of information are commonly included in headers and footers? Check all that apply.
    10·1 answer
  • The smallest unit of storage is​
    15·1 answer
  • Any kind of brances in science
    13·1 answer
  • Which of the following is non-volatile storage?
    6·1 answer
  • What means the data is still saved even if you turn the computer off or unplug it?​
    5·1 answer
  • Which lighting technique can often heighten a dramatic story?
    14·1 answer
  • For which input values will the following loop not correctly compute the maximum of the values? 1. Scanner in = new Scanner (Sys
    14·1 answer
  • What plan can businesses use to protect sensitive data from malicious attacks?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!