Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Lost Updates: Suppose the two transactions T3 and T4 run simultaneously and they happen to be interleaved in the following way (suppose the initial value of X as
10000):
T3
T4
Value of X
READ X
10000
SUB 5000
5000
ADD 3000
13000
WRITE X
After the implementation of both the transactions the value X is 13000 whereas the semantically correct value should be 8000. The trouble occurred as the update made by T3 has been overwritten by T4. The root cause of the trouble was the fact that both the transactions had read the value of X as 10000. Therefore one of the two updates has been lost and we say that a lost update has occurred.
There is one more way in which the lost updates can happen. Consider the following part of some transactions:
T5
T6
Value of x originally
2000
UPDATE X
3000
4000
ROLLBACK
Here T5 & T6 updates the similar item X. After that T5 decides to undo its action and rolls back causing the value of X to go back to the original value that was 2000. In this case also the update performed by T6 had got lost and a lost update is said to have happened.
The Maximum no of key fields that can be used in a header is?? 50
What is RDBMS? Relational Data Base Management Systems (RDBMS) are database management systems that maintain data records and indices in tables. Relationships may be formed and
Differentiate between natural join and outer join? Natural join is a binary operator which is written as (R * S) where as R and S are relations. The output of the natural join
While using extract datasets it is required to have a special workarea for interface False. It is not required to have a special workarea for interface
Question 1 List and explain various Normal Forms. How BCNF differs from the Third Normal Form and 4th Normal forms? Question 2 Describe the concepts of Structural Semantic Da
What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it
Submit the table creation statements (including constraints) for the Database Model. Submit them all in a single script file. Also submit a document explaining what test data yo
What is deadlock? How can it be avoided? How can it be resolved once it occurs? Deadlock happens when two transactions are each waiting on a resource that the other transaction
Examples:- Hierarchical Model: It tells data as and relationships by hierarchy of data values. Figure illustrates an example of hierarchical model. Now a day's these models are
Vertical Fragmentation- Vertical fragmentation groups together only those attributes in a relation that are used jointly by various important transactions. A vertical fragment is d
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd