InterviewSolution
Saved Bookmarks
| 1. |
To prevent the phantom phenomenon, _______ is used(a) Key value locking(b) Next key locking(c) Previous key locking(d) None of the mentionedThe question was asked in unit test.My question comes from Insert, Delete Operations and Predicate Reads in chapter Concurrency Control of RDBMS |
|
Answer» Right option is (B) Next key locking |
|