Consider an isolation level implemented using long-duration granular locks on rows and tables. Under what conditions can phantoms occur?

What will be an ideal response?

If a SELECT statement, using a read predicate, gets long term read locks on the
rows that satisfy that predicate, those locks do not prevent another transaction from
inserting a rowthat also satisfies that predicate.

Computer Science & Information Technology

You might also like to view...

Which port does Remote Desktop Services use?

A. 1812 B. 389 C. 3389 D. 1813

Computer Science & Information Technology

Each of the following is an example of an intellectual property category EXCEPT ________

A) court orders B) patents C) trademarks D) service marks

Computer Science & Information Technology