Consider an isolation level implemented using long-duration granular locks on rows and tables. Under what conditions can phantoms occur?
What will be an ideal response?
If a SELECT statement, using a read predicate, gets long term read locks on the
rows that satisfy that predicate, those locks do not prevent another transaction from
inserting a rowthat also satisfies that predicate.
Computer Science & Information Technology
You might also like to view...
Which port does Remote Desktop Services use?
A. 1812 B. 389 C. 3389 D. 1813
Computer Science & Information Technology
Each of the following is an example of an intellectual property category EXCEPT ________
A) court orders B) patents C) trademarks D) service marks
Computer Science & Information Technology