Differentiate between strict and rigorous two phase locking, Database Management System

Assignment Help:

Differentiate between strict two-phase and rigorous two-phase with conversion protocol

Ans:  Strict two-phase locking holds all its exclusive that is write locks until commit time, one time granted. When Rigorous two-phase locking is more restrictive as compared to standard 2PL in that it enforces the rule that no locks can be released through a transaction until after it commits or aborts. The former locks all its items previous to it starts thus once transaction starts, it is in its shrinking phase while latter does not unlock any of its items until after it terminates to the transaction is in its expanding phase till it ends.


Related Discussions:- Differentiate between strict and rigorous two phase locking

What is object containment, What is object containment? References amon...

What is object containment? References among objects can be used to model dissimilar real-world concepts.

Determine the advanced modeling concepts, Determine the Advanced modeling c...

Determine the Advanced modeling concepts You have to follow some steps for object-oriented design. These steps for OO Design methodology are as follow:  1)  Produce objec

Datawarehouse, How to define a job scheduling strategy that will meet busin...

How to define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a

In tuple relational calculus p1- p2 is equivalent to, In tuple relational ...

In tuple relational calculus P1 → P2 is equivalent to ? A In tuple relational calculus P1→  P2 is equivalent to ¬P1 V P2. (The logical implication expression A  B, meaning

Short note on mid square method of hashing, Short Note on mid Square Method...

Short Note on mid Square Method of hashing? Mid square method of hashing: In the method midsquare hashing, the key is squared and the address selected from the center of the s

Explain the shadow paging recovery technique, Explain the shadow paging rec...

Explain the shadow paging recovery technique.  Ans: Shadow paging is a method used to acquire atomic and durable transactions, and provides the capability to manipulate pages i

Primary interface between a visual basic application, Question (a) Visu...

Question (a) Visual Basic is governed by an event processor. Explain the meaning of this phrase. (b) Differentiate between an general procedure and event procedure. (c)

Example of weak entity, Consider the entity type dependent related to emplo...

Consider the entity type dependent related to employee entity, which is used to keep track of the dependents of every employee. The attributes of dependents are: name, sex, birth d

An Apriori algorithm, Submission Requirements All answers must be co...

Submission Requirements All answers must be computer generated (including text and diagrams). The hand-in version must include a header page (or with sufficient space)

Tuples-attributes , Consider a relation s over the attributes A and B wit...

Consider a relation s over the attributes A and B with the following characteristics: 5,000 tuples with 10 tuples per page A 2-level B+ tree index on attribute

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd