What is the Lock Based Protocol used for?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Databases AllOther Interview Questions

First input columns brand, mt, re values are ov, 1,re vg, 2,re wu ,3,re. Second input columns are brand, mt, cx their records are ov,4,vg ,5,cx Wu, 6,cx and third input columns brand, mt, rt values are ov,7,rt vg, 8,rt wu, 9,rt but my output is brand, re, cx,rt values are ov, 1,4,7 vg, 2,5,8 wu, 3,6,9

0 Answers   IBM,


What is a super key?

0 Answers   3i Infotech,


What is a trace file?

0 Answers   Tech Mahindra,


What are the three types of anomalies in database and Explain?

9 Answers  


What is the Difference Primary key and Unique Key

0 Answers   HCL,






plz suggest me the book for preparation of NIC exam.

10 Answers   NIC,


What does new grouping sets enables you to do?

0 Answers   ADITI,


Integrity constraints means..? how many and what are they?

4 Answers   AZTEC,


Explain partial key?

0 Answers  


What do you mean by database?

0 Answers  


What is the best database software for small businesses?

0 Answers  


What is a database call?

0 Answers  


Categories