Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Lock Based Protocol
A lock is nothing but a mechanism that tells the DBMS whether a particular data item is being used by any transaction for read/write purpose. As there are two types of operations, i.e. read and write, whose basic nature are dissimilar, the locks for read and write operation might be behave differently.
Read operation performed by dissimilar transactions on the same data item poses less of a challenge. The value of the data item, if constant, can be read by any number of transactions at any given time.
Example -GRANT CREATE SESSION TO MCA12; (This command gives system level permission on creating a session - not portable) GRANT SELECT ON EMP TO MCA12; (Object level permi
What are the various states through which a transaction passes through in its lifetime? Briefly discuss all the events that causes transition from one state to another. Ans:
A View may be defined of as a virtual table, that is, a table that does not really exist in its own right but is instead inferred from one or more underlying base data table. T
Define average latency time. The average latency time of the disk is one-half the time for a full rotation of the disk.
give some example real-life situations where DBMS are most suiitabe
What are the costs to be considered when a transaction has to be rolled back when recovering from deadlock? Ans: A few transaction will must rolled back (made a victim)
Develop a database broker framework to implement a persistence mechanism for the domain objects involved in the use case dealt with in Question 2. a. Specify the attribute type
WHAT IS DATABASE TECHNOLOGIES
What are advantages of object models? Object models are efficient for communicating with the application experts and reaching a consensus about the significant aspects of the p
How does the two phase protocol ensure serializability in database schedules? Ans: A transaction is termed to follow the two-phase locking protocol if all locking operations
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd