________ is used to ensure that, when two users are editing a table, they cannot edit the same row (or record) of data
Fill in the blank(s) with correct word
Row-level locking
Computer Science & Information Technology
You might also like to view...
The POODLE attack is an MITM exploit that affects:
A. TLS1.0 with CBC mode cipher B. SSLv2.0 with CBC mode cipher C. SSLv3.0 with CBC mode cipher D. SSLv3.0 with ECB mode cipher
Computer Science & Information Technology
Classes cannot:
a. Be derived from other classes. b. Initialize data members in the class definition. c. Be used to model attributes and behaviors of objects. d. Include objects from other classes as members.
Computer Science & Information Technology