Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Inconsistent Analysis: The problem as given with transactions T1 and T2 where two transactions interleave to make incorrect result during an analysis by Audit is the instance of such a problem. This problem happens when more than one data items are being used for analysis, whereas another transaction has modified some of that value and some are yet to be modified. Therefore, an analysis transaction reads values from the inconsistent state of the database those results in inconsistent analysis.
Therefore, we can conclude that the prime reason of troubles of concurrent transactions is that a transaction reads an inconsistent state of the database that has been formed by other transaction.
But how do we ensure that implementation of two or more transactions have not resulted in a concurrency related problem?
Well one of the commonest techniques used for this purpose is to restrict access to data items that are being written or read by single transaction and is being written by another transaction. This technique is known as locking.
Example: Consider the following relations: ROLLNO NAME ADDRESS COURSE_ID 100 Ka
Question 1 Explain ER model Question 2 What are the characteristics of a computer provided information? Question 3 What are facts and guidelines to be considered when se
NEED FOR A DATABASE MANAGEMENT SYSTEM A Database is a structured, persistent collection of data of an organisation. The database management system (DBMS) manages the database o
The primary key is selected from the
What is magnetic disks?explain it? Magnetic disk provides the bulk of secondary storage of modern computer system. The disk capacity is growing at over 50% per year. But the st
Write short notes on relational constraints? Relational Constraints are: 1. NOT NULL 2. Unique 3. Primary key 4. Foreign key 5. Table check
What is meant by software and hardware RAID systems? RAID can be executed with no change at the hardware level, using only software modification. Such RAID implementations are
It is not possible to make an ABAP/4 program, which having only Subroutines. False. We can make ABAP/4 program, which having only Subroutines.
What is the main advantage of the object model? What are its different components? The object model focuses on the logical data structures. Each object model comprises of many
Explain about primary key Primary Key: It is one of the candidate keys that are taken to be the recognizing key for the entire table. E.g. although there are two candidate ke
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd