In order to maintain transactional integrity and database consistency, what technology does a DBMS deploy?
(a) Triggers
(b) Pointers
(c) Locks
(d) Cursors
The question was posed to me in an interview for job.
I would like to ask this question from Lock-Based Protocols in division Concurrency Control of Database Management