Database Reference
In-Depth Information
log
logical unit of work (LUW)
login name
lost update problem
nonrepeatable read
optimistic locking
passive repository
pessimistic locking
phantom read
processing rights and responsibilities
read-committed isolation level
read-uncommitted isolation level
recovery via reprocessing
recovery via rollback/rollforward
repeatable-read isolation level
resource locking role
rollback
rollforward
scrollable cursor
serializable
serializable isolation level
shared lock
shrinking phase
SQL BEGIN TRANSACTION statement
SQL COMMIT TRANSACTION statement
SQL cursor
SQL Data Control Language (DCL)
SQL DECLARE CURSOR statement
SQL GRANT statement
SQL injection attack
SQL REVOKE statement
SQL ROLLBACK TRANSACTION
statement
SQL START TRANSACTION statement
SQL Transaction Control
Language (TCL)
SQL WORK keyword
statement-level consistency
static cursor
strong password
transaction
transaction isolation level
transaction-level consistency
two-phase locking
user group
user name
Review Questions
9.1 Briefly describe five difficult problems for organizations that create and use multiuser
databases.
9.2 Explain the difference between a database administrator and a data administrator.
9.3 List seven important DBA tasks.
9.4 Summarize the DBA's responsibilities for managing database structure.
9.5 What is configuration control? Why is it necessary?
9.6 Explain the meaning of the word inappropriately in the phrase “one user's work does
not inappropriately influence another user's work.”
9.7 Explain the trade-off that exists in concurrency control.
9.8 Define an atomic transaction, and explain why atomicity is important.
9.9 Explain the difference between concurrent transactions and simultaneous transac-
tions. How many CPUs are required for simultaneous transactions?
9.10 Give an example, other than the one in this text, of the lost update problem.
9.11 Explain the difference between an explicit and an implicit lock.
9.12 What is lock granularity?
9.13 Explain the difference between an exclusive lock and a shared lock.
9.14 Explain two-phase locking.
9.15 How does releasing all locks at the end of the transaction relate to two-phase locking?
9.16 In general, how should the boundaries of a transaction be defined?
 
 
Search WWH ::




Custom Search