Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Inconsistent Analysis: The problem as given with transactions T1 and T2 where two transactions interleave to make incorrect result during an analysis by Audit is the instance of such a problem. This problem happens when more than one data items are being used for analysis, whereas another transaction has modified some of that value and some are yet to be modified. Therefore, an analysis transaction reads values from the inconsistent state of the database those results in inconsistent analysis.
Therefore, we can conclude that the prime reason of troubles of concurrent transactions is that a transaction reads an inconsistent state of the database that has been formed by other transaction.
But how do we ensure that implementation of two or more transactions have not resulted in a concurrency related problem?
Well one of the commonest techniques used for this purpose is to restrict access to data items that are being written or read by single transaction and is being written by another transaction. This technique is known as locking.
Problem 1. Write an assembly program to find the smallest among two numbers Writing an assembly program to find the smallest among two numbers 2. Explain the intern
Define weak and strong entity sets? Weak entity set: entity set that do not have key attribute of their own are known as weak entity sets. Strong entity set
File Manager File manager handles the allocation of space on disk storage. It starts and maintains the list of structures and indices described in the internal schema that is
How can you map NULL values to other values while display? IF( ) , IFNULL( ) keywords are used to do so. They are 'LIMIT' is used for the following kinds of problems: 1) Ans
What is the difference between serial and sequential files? How searching is applied on both? Ans: A serial file is one where the records have been stored in the order where
Relational and E-R Model There are three types of constraints on relational database that have: DOMAIN CONSTRAINT PRIMARY KEY CONSTRAINT INTEGRITY CONSTRAINT
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4
please describe the data base management with the easy example &give the application?
Cardinality of Relationship One-to-One Only one entity of the first set is linked to only one entity of the second set. E.g. A teacher teaches a student. Only one teacher
Discuss the methods for a hash file to expand and shrink dynamically. What are the advantages and disadvantages of each? The hashing methods that permit dyanamic file expansi
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd