Computer Science Engineering (CSE) Exam  >  Computer Science Engineering (CSE) Questions  >  Which of the following is correct according t... Start Learning for Free
Which of the following is correct according to the technology deployed by DBMS?
  • a)
    Pointers are used to maintain transactional integrity and consistency
  • b)
    Cursors are used to maintain transactional integrity and consistency
  • c)
    Locks are used to maintain transactional integrity and consistency
  • d)
    Triggers are used to maintain transactional integrity and consistency
Correct answer is option 'C'. Can you explain this answer?
Most Upvoted Answer
Which of the following is correct according to the technology deployed...
DBMS Technology for Maintaining Transactional Integrity and Consistency

Transactional integrity and consistency are essential for any database management system. Here are the different technologies used by DBMS to maintain them:

1. Locks:
- DBMS uses locks to maintain transactional integrity and consistency.
- Locks are used to prevent multiple users from accessing the same data simultaneously.
- It ensures that only one user can modify the data at a time, avoiding any inconsistency or data corruption.

2. Pointers:
- Pointers are not used to maintain transactional integrity and consistency in a DBMS.
- They are used in programming languages to store the memory address of a variable or function.

3. Cursors:
- Cursors are not used to maintain transactional integrity and consistency in a DBMS.
- Cursors are used to traverse through the records retrieved by a query.

4. Triggers:
- Triggers are used to maintain transactional integrity and consistency in a DBMS.
- They are special procedures that are executed automatically when a specific event occurs.
- Triggers are used to enforce business rules, data validation, and maintain referential integrity.

Therefore, option 'C' is correct as locks are used to maintain transactional integrity and consistency in a DBMS.
Free Test
Community Answer
Which of the following is correct according to the technology deployed...
Pointers are used to access data with great speed and accuracy. Consistency is maintained using locks.
Explore Courses for Computer Science Engineering (CSE) exam

Top Courses for Computer Science Engineering (CSE)

Which of the following is correct according to the technology deployed by DBMS?a)Pointers are used to maintain transactional integrity and consistencyb)Cursors are used to maintain transactional integrity and consistencyc)Locks are used to maintain transactional integrity and consistencyd)Triggers are used to maintain transactional integrity and consistencyCorrect answer is option 'C'. Can you explain this answer?
Question Description
Which of the following is correct according to the technology deployed by DBMS?a)Pointers are used to maintain transactional integrity and consistencyb)Cursors are used to maintain transactional integrity and consistencyc)Locks are used to maintain transactional integrity and consistencyd)Triggers are used to maintain transactional integrity and consistencyCorrect answer is option 'C'. Can you explain this answer? for Computer Science Engineering (CSE) 2024 is part of Computer Science Engineering (CSE) preparation. The Question and answers have been prepared according to the Computer Science Engineering (CSE) exam syllabus. Information about Which of the following is correct according to the technology deployed by DBMS?a)Pointers are used to maintain transactional integrity and consistencyb)Cursors are used to maintain transactional integrity and consistencyc)Locks are used to maintain transactional integrity and consistencyd)Triggers are used to maintain transactional integrity and consistencyCorrect answer is option 'C'. Can you explain this answer? covers all topics & solutions for Computer Science Engineering (CSE) 2024 Exam. Find important definitions, questions, meanings, examples, exercises and tests below for Which of the following is correct according to the technology deployed by DBMS?a)Pointers are used to maintain transactional integrity and consistencyb)Cursors are used to maintain transactional integrity and consistencyc)Locks are used to maintain transactional integrity and consistencyd)Triggers are used to maintain transactional integrity and consistencyCorrect answer is option 'C'. Can you explain this answer?.
Solutions for Which of the following is correct according to the technology deployed by DBMS?a)Pointers are used to maintain transactional integrity and consistencyb)Cursors are used to maintain transactional integrity and consistencyc)Locks are used to maintain transactional integrity and consistencyd)Triggers are used to maintain transactional integrity and consistencyCorrect answer is option 'C'. Can you explain this answer? in English & in Hindi are available as part of our courses for Computer Science Engineering (CSE). Download more important topics, notes, lectures and mock test series for Computer Science Engineering (CSE) Exam by signing up for free.
Here you can find the meaning of Which of the following is correct according to the technology deployed by DBMS?a)Pointers are used to maintain transactional integrity and consistencyb)Cursors are used to maintain transactional integrity and consistencyc)Locks are used to maintain transactional integrity and consistencyd)Triggers are used to maintain transactional integrity and consistencyCorrect answer is option 'C'. Can you explain this answer? defined & explained in the simplest way possible. Besides giving the explanation of Which of the following is correct according to the technology deployed by DBMS?a)Pointers are used to maintain transactional integrity and consistencyb)Cursors are used to maintain transactional integrity and consistencyc)Locks are used to maintain transactional integrity and consistencyd)Triggers are used to maintain transactional integrity and consistencyCorrect answer is option 'C'. Can you explain this answer?, a detailed solution for Which of the following is correct according to the technology deployed by DBMS?a)Pointers are used to maintain transactional integrity and consistencyb)Cursors are used to maintain transactional integrity and consistencyc)Locks are used to maintain transactional integrity and consistencyd)Triggers are used to maintain transactional integrity and consistencyCorrect answer is option 'C'. Can you explain this answer? has been provided alongside types of Which of the following is correct according to the technology deployed by DBMS?a)Pointers are used to maintain transactional integrity and consistencyb)Cursors are used to maintain transactional integrity and consistencyc)Locks are used to maintain transactional integrity and consistencyd)Triggers are used to maintain transactional integrity and consistencyCorrect answer is option 'C'. Can you explain this answer? theory, EduRev gives you an ample number of questions to practice Which of the following is correct according to the technology deployed by DBMS?a)Pointers are used to maintain transactional integrity and consistencyb)Cursors are used to maintain transactional integrity and consistencyc)Locks are used to maintain transactional integrity and consistencyd)Triggers are used to maintain transactional integrity and consistencyCorrect answer is option 'C'. Can you explain this answer? tests, examples and also practice Computer Science Engineering (CSE) tests.
Explore Courses for Computer Science Engineering (CSE) exam

Top Courses for Computer Science Engineering (CSE)

Explore Courses
Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev