menu
home
Home
search
Search
people
About Us
exit_to_app
Login
home
Home
search
Search
people
About Us
exit_to_app
Login
Practicing for Lock-Based Protocols of Database Management System
Questions 1 of 10
Q. In order to maintain transactional integrity and database consistency, what technology does a DBMS deploy?
Triggers
Pointers
Locks
Cursors
Submit
lock
Login
person
Signup
Email
Password
Name
Email
Password
Confirm Password