Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Example:; transfers transfer_amount from x's account to y's account
; Supposes x&y both accounts exist
TRANSACTION (x, y, transfer_amount)
Start transaction
IF X AND Y exist then
READ x.balance
IF x.balance > transfer_amount THEN
x.balance = x.balance - transfer_amount
READ y.balance
y.balance = y.balance + transfer_amount
COMMIT
ELSE DISPLAY ("BALANCE IN X NOT OK") ROLLBACK
ELSE DISPLAY ("ACCOUNT X OR Y DOES NOT EXIST") End_transaction
Please note the use of 2 keywords here COMMIT and ROLLBACK. Commit makes sure that all the modifications made by transactions are made permanent. ROLLBACK ends the transactions and discards any change made by the transaction. Transactions have definite desirable properties. Let us see into those properties of a transaction.
Entity types that do not have any key attribute, and therefore cannot be identified independently, are known as weak entity types. A weak entity can be recognized uniquely only by
What's the difference between a primary key and a unique key? Both primary key and unique key enforces uniqueness of the column on which they are explained. But by default prim
Describe multi key files
Properties of a Transaction A transaction has four main properties. These are: Atomicity Consistency Isolation or Independence Durability or Permanen
Briefly describe the different kinds of users of a DBMS. Ans: Different sorts of DBMS users are: (a) Software Engineers: These are the people accountable for developing ap
Consider the following relational schema: Doctor(DName,Reg_no) Patient(Pname, Disease) Assigned_To (Pname,Dname) Give expression in both Tuple calculus and Domain calculus for
With the help of a suitable diagram gives module wise explanation of system architecture of DBMS.on..
Define Deadlock prevention These protocols make sure that the system will never enter a deadlock state. There are two methods to deadlock prevention. One approach makes sure t
You will be analysing a set of financial data of your choice. It is not necessary to collect any primary data of your own, and publicly available secondary data will be sufficient
Question: Using the data model express the following queries in SQL. (a) Create the Table named "Cinema" and make the cinema_code to be the primary key of the relation and
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd