Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
A distributed transaction consists of subtransactions that execute at different sites and access local DBMSs at those sites. For example, a distributed transaction that transfers money from a bank account at site A to a bank account at site B executes a subtransaction at A that does the withdrawal and then a subtransaction at B that does the deposit.
Such a distributed transaction must satisfy the ACID properties in a global sense: it must be globally atomic, isolated, consistent, and durable. The issue is, if the subtransactions at each site individually satisfy the ACID properties, does the distributed transaction necessarily satisfy the ACID properties? Certainly if the subtransactions at each site are individually durable, the distributed transaction is durable. Give examples of situations in which
(a) The subtransactions at each site are atomic, but the distributed transaction is not atomic.
(b) The subtransactions at each site are consistent, but the distributed transaction is not consistent.
(c) The subtransactions at each site are isolated, but the distributed transaction is not isolated.
What is Foreign Key Foreign Key: Sometimes we may have to work with an attribute that does not have a primary key of its own. To recognize its rows, we have to use the primar
SET concept is used in which type of modelling? SET concept is used in Network Model.
Explain what is Aggregation? Aggregation: Aggregation is an significant concept in database design whereas composite objects could be modelled during the design of database a
Define DBMS? DBMS: database management system (DBMS) is computer software designed for the reason of supervision databases based on a variety of data models.
What are metrics for choosing the best algorithm? Matrices for choosing the best algorithms are as below: Computational complexity Ease of understand ability and im
The basic merits of decomposition. The Advantages of Decomposition 1. Separate person can work on each subsystem. 2. A particular software engineer can specialize in a
The technique of converting the state diagram to code a) Identify all major control paths. Start from initial state; choose a path across the diagram that corresponds to normal
Candidate Key: In a relation R, a candidate key for R is a subset of the set of attributes of R, which have the differnt two properties: (1) Uniqueness: N
Which method is used to key transformation ? A hash method is used to key transformation.
projects?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd