Dirty reads-problems of concurrent transactions, Database Management System

Dirty Reads: T10 reads a value which is updated by T9. This update has not been committed and T9 aborts.

T9

T10

Value of x old value =

200

T9

T10

UPDATE X

 

500

 

 

READ X

 

500

ROLLBACK

 

200

?

Here T10 reads a value that is updated by transaction T9 that has been aborted. Therefore T10 has read a value that would never exist in the database and hence the trouble. Here the difficulty is primarily of isolation of transaction.

 

Posted Date: 3/12/2013 1:51:39 AM | Location : United States







Related Discussions:- Dirty reads-problems of concurrent transactions, Assignment Help, Ask Question on Dirty reads-problems of concurrent transactions, Get Answer, Expert's Help, Dirty reads-problems of concurrent transactions Discussions

Write discussion on Dirty reads-problems of concurrent transactions
Your posts are moderated
Related Questions
i want to database for online assignment submission system

Short Note on mid Square Method of hashing? Mid square method of hashing: In the method midsquare hashing, the key is squared and the address selected from the center of the s

What is data model? Explain object based and record based data models? Ans: A data model is an abstract model in which describes how data is represented and accessed. (i)

Synonyms It allows short names or alternative names for objects. Example :               CREATE SYNONYM D30               FOR EMPD30;   Now if we give command:

What are the aggregate objects in the data dictionary? Views Match codes Lock objects.

Explain Dynamic Two-Phase Locking Here a transaction locks a data item instantly earlier than any operation is applied on the data item.  After finishing all the operations on

What is the meaning of Recovery? In deferred update methods, if a transaction fails before arriving its commit point, it will not have altered the database in any way, so UNDO

For problems 1-4, give all candidate keys for the tables with FDs specified.  Composite candidate keys must be put in parentheses, and candidate keys must be separated with commas

Why were functional methods fashionable in early days? These are inspired directly by computer architecture and thus popular among computer scientist in early days. The divisio

What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it