Question on database systems-concurrency control

Assignment Help Basic Computer Science
Reference no: EM131434229

Question on Database Systems-Concurrency Control

A popular update operation is increment/decrement the numeric value of data object by 1. Suppose we are now to create a lock mode I, along with usual shared and exclusive lock modes. Consider a locking protocol that will require a request for a lock with mode I on a data object Q (with numeric value) before proceeding with the increment/decrement operation on Q.

(i) Provide a lock compatibility matrix with these three modes.

(ii) Will this protocol provide more concurrency (data sharing) than the one with only shared and exclusive lock modes?

(iii) Suppose the increment/decrement operation is modified such that the operation will fail if the value of data object will become negative after the operation. Are your answers to (i) and (ii) still valid? Explain your answer.

Reference no: EM131434229

Questions Cloud

Role of information systems in an organization : An analysis of the role of information systems in an organization. Explain why information systems are so important to organizations. Also explain the positive and negative effects information systems have on an organization, and why.
Research the organizational change process : Research the organizational change process, challenges, and issues. Use resources from professional literature in your research.
Important mobile design tools : What are some of the most important mobile design tools? How would you use them? What are their advantages and disadvantages?
Compare to hitler and the jewish holocaust in your eyes : How does this genocide compare to Hitler and the Jewish Holocaust in your eyes - Which do you think motivated Leopold II more, racial prejudice or financial greed?
Question on database systems-concurrency control : A popular update operation is increment/decrement the numeric value of data object by 1. Suppose we are now to create a lock mode I, along with usual shared and exclusive lock modes. Consider a locking protocol that will require a request for a lo..
Describe a typical day for you : Describe a typical day for you (where you go, who you see etc.) - Describe where you work and what you do there and what things are difficult for you everyday?
Discuss the systems development life cycle : Discuss the systems development life cycle as applied to project management: Initiation, Planning, Acquisition or design and development, Implementation, Operations/Maintenance, Disposition/Disposal
Discuss the systems development life cycle : Discuss the systems development life cycle as applied to project management: Initiation, Planning, Acquisition or design and development, Implementation, Operations/Maintenance, Disposition/Disposal
How can he avoid making the same mistake in the future : So the guy removed snow from a wrong car. So what? Was he efficient, effective, neither, or both? How can he avoid making the same mistake in the future?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What effect does this limit have on users

Some operating systems have a tree-structured file system but limit the depth of the tree to some small number of levels. What effect does this limit have on users? How does this simplify file system design (if it does)?

  What is the big o performance of your algorithm

Write an efficient algorithm for combining two arbitrary-sized heaps into one heap. What is the Big O performance of your algorithm?

  Draw an rea diagram-data modeling and database design

Data modeling and database design,  Draw an REA Diagram,  Draw an REA diagram for Sparky’s revenue cycle only. Be sure to include cardinalities. State any assumptions you had to make.

  What three groups of people at the law firm

The law firm of Dewey, Cheatham, & Howe is considering the implementation of a new information system. To that end, they have hired your firm to perform the Systems Analysis process. They understand that a successful system must be aligned with th..

  Considering what you know about video cards

1. Considering what you know about video cards and monitors, take a step into the future and ask yourself, "If I were buying a new system today, for myself or my family, what would I want?" In asking this question, consider if

  Write a program in vb using repetition

Write a program in VB using repetition's such as a do loop that will display the results when a button is clicked.

  Supply management address in global procurements

1. Building on what you have learned about building strategic partnership in this course, why is negotiation the best form of dispute resolution? Explain your reasoning 2. What additional legal issues should supply management address in global pr..

  Engaging in a computer science major

What are the benefits to engaging in a Computer Science major and what fields will allow me to branch out to?

  Demonstrate critical analysis and precision in writing

You have the opportunity to review three employee satisfaction surveys https://www.qualtrics.com/blog/employee-satisfaction-survey/ . A key role for the HR department is to take the temperature of the employees-figuratively, not literally. A very ..

  Which of the following addresses are not allowed on internet

Which of the following addresses are not allowed on the internet?

  Effective perimeter and network defense methods

What would you consider the most effective perimeter and network defense methods available to safeguard network assets? Your answer should include at least one practical example of each type of defense and potential type of attack.

  Best practices evaluation

Best Practices Evaluation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd