Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Inconsistent Analysis: The problem as given with transactions T1 and T2 where two transactions interleave to make incorrect result during an analysis by Audit is the instance of such a problem. This problem happens when more than one data items are being used for analysis, whereas another transaction has modified some of that value and some are yet to be modified. Therefore, an analysis transaction reads values from the inconsistent state of the database those results in inconsistent analysis.
Therefore, we can conclude that the prime reason of troubles of concurrent transactions is that a transaction reads an inconsistent state of the database that has been formed by other transaction.
But how do we ensure that implementation of two or more transactions have not resulted in a concurrency related problem?
Well one of the commonest techniques used for this purpose is to restrict access to data items that are being written or read by single transaction and is being written by another transaction. This technique is known as locking.
Insulation between conceptual and physical structures It can be defined as: 1. The Database Administrator should be capable to vary the storage structures without affectin
If R1 and R2 are two relations or functions, then the result of R3 = R1 × R2 is the combination of tuples that are in R1 and R2. The product is associative and commutative. Degr
Convert the following ER - diagram (Entity Relationship Diagram) into a relational database (the primary keys are underlined): Ans: The relational database schema f
What is use of generating such tables? How can you create temporary tables? When you require a table only for a short time after that you want it to disappear automatically you
Question 1: (a) Explain the legal meaning of :- (i) Computer Service Person (ii) Data holding (b) Explain how the law ensures Data protection and Security. Qu
What is called an evaluation primitive? A relational algebra operation annotated with instructions on how to evaluate is known as an evaluation primitive.
What are the two types of indices? The two types of indices are:- A) Dense index B) Sparse index
Give detail description on Transactions. - Using transactions we can group all SQL commands into a single unit. - Transaction begins with some task and finishes only when a
Explain the EXEC statement in SQL Ans: All statements which start with EXEC SQL are embedded SQL database statements. High level languages such as C can be employed to write a
Determine the Disadvantages of file based systems Some of the disadvantages of file based systems are like this: Data redundancy and inconsistency: the dissimilar applic
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd