To prevent the phantom phenomenon, _______ is used
(a) Key value locking
(b) Next key locking
(c) Previous key locking
(d) None of the mentioned
The question was asked in unit test.
My question comes from Insert, Delete Operations and Predicate Reads in chapter Concurrency Control of RDBMS