Transactions t1 and t2 are in a deadlock, Database Management System

Evaluate:

a.When transactions T1 and T2 are in a deadlock, one of the transactions will eventually implement to completion and let the other one continue implementation.

b. When an inform to the database takes place, the time of the update, the values of the data previous to and after the update, and the type of lock used are recorded in the transaction log.

c. To restore a database using the instant update approach, both undo and redo operations may be essential, while with the deferred update approach only redo operations are used.

 

Posted Date: 3/20/2013 7:45:17 AM | Location : United States







Related Discussions:- Transactions t1 and t2 are in a deadlock, Assignment Help, Ask Question on Transactions t1 and t2 are in a deadlock, Get Answer, Expert's Help, Transactions t1 and t2 are in a deadlock Discussions

Write discussion on Transactions t1 and t2 are in a deadlock
Your posts are moderated
Related Questions
Explain the Exec statement in SQL Ans: Exec statement has the structure    EXEC SQL END-EXEC   Embeded SQl statements are of a form identical to non embedded SQL statem

A distributed transaction consists of subtransactions that execute at different sites and access local DBMSs at those sites. For example, a distributed transaction that transfers m

Views A view is like a window by which data from tables can be changed or viewed. The table on which a view is based is known as Base table. The view is stored as a SELECT stat

What are the failures of Controlling Events Between Objects  Failure Unintentional termination of system. Several possible causes: failure of system hardware, o

Describe the candidate key functions ? Candidate Key and Alternate Key: In some instances, an entity will have more than one attribute which can serve as a primary key. Any key

it can be possible to create any table without primary key

Explain the Fundamental concepts of object-orientation Software developers, data base administrators (DBAs) need to be familiar with fundamental concepts of object-orientation.

What is a shadow copy scheme? It is simple, but efficient, scheme known as the shadow copy schemes. It is based on making copies of the database called shadow copies that singl

Why are cursors necessary in embedded SQL? A cursor is an object used to store the output of a query for row-by-row processing through the application programs. SQL statements

What are the Constituents of File? Also elaborates all the possible file operations? A file is organised logically as sequence of record. These records are mapped onto disk blo