________ is used to ensure that, when two users are editing a table, they cannot edit the same row (or record) of data

Fill in the blank(s) with correct word

Row-level locking

Computer Science & Information Technology

You might also like to view...

The POODLE attack is an MITM exploit that affects:

A. TLS1.0 with CBC mode cipher B. SSLv2.0 with CBC mode cipher C. SSLv3.0 with CBC mode cipher D. SSLv3.0 with ECB mode cipher

Computer Science & Information Technology

Classes cannot:

a. Be derived from other classes. b. Initialize data members in the class definition. c. Be used to model attributes and behaviors of objects. d. Include objects from other classes as members.

Computer Science & Information Technology