If you have access to MySQL 5.7, search its help system to answer the following
questions.
A. How does MySQL 5.7 use read locks and write locks?
B. What, if any, levels of transaction isolation are available in MySQL 5.7?
C. What types of cursors, if any, does MySQL 5.7 use?
D. How does the security model for MySQL 5.7 differ from that shown in
Figure 6-16?
E. Summarize the backup capabilities of MySQL 5.7.
F. Summarize the recovery capabilities of MySQL 5.7.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here