Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain Strict Two-Phase locking
A transaction T does not release any type of its exclusive (X) locks until that transaction commits or aborts. In this method no other transaction can access the item which is written by T unless the transaction T commits. This is a better method than the two discussed.
In 2PL, a transaction may not be capable to release its locks even after make use of it. The data item will stay locked until the transaction ends all the actions on all the data items. If each transaction in a schedule follows 2PL after that conflict serializability can be made sure. This is since if the schedule is not serializable, the precedence graph for schedule S contains transactions T1, T2 ..... Tn will have a cycle ... assume that a cycle consists of T1, T2 ..... Tn ,T1. The meaning of this is that a lock operation by T2 is followed by an unlock operation by T1; A Lockoperation T3 is followed by an unlock operation by T2 ... and etc. Though this is a contradiction of the assertion that T1 is by using two phase locking protocol. So the assumption that graph is having a cycle is wrong and therefore S is serializable.
What are the various states through which a transaction passes through in its lifetime? Briefly discuss all the events that causes transition from one state to another. Ans:
courier company er-diagram
Create student database and retrieve course name taught by king? STUDENT (name, student#, class, major) COURSE (course name, course#, credit hours, department) SECTION (secti
Example: //REVOKE ALL ON EMP FROM MCA12; (All permissions will be cancelled) You can also cancel only some of the permissions. Drop: A user-
1) Information about a bank is about customers and their account. Customer has a name, address which consists of house number, area and city, and one or more phone numbers. Ac
How many types of users works on database? Users are differentiated through the way they expect to interact along with the system (i) Application programmers-interact with
Relationship between Security and Integrity: Database security usually refers to access, while database integrity refers to avoidance of accidental loss of consistency. But usually
What is data integrity? Ans: It is the data consisted of in database that is accurate and consistent. (Data integrity means that the data should be valid as per to the give
Which types of data supported by MySQL for Time and Date formats? MySQL supports a number of time and date column formats: Some of them are 1) DATE 2) DATETIME 3) TIM
What is storage manager? A storage manager is a program module that gives the interface between the Low level data kept in a database and the application programs
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd