Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Lost Updates: Suppose the two transactions T3 and T4 run simultaneously and they happen to be interleaved in the following way (suppose the initial value of X as
10000):
T3
T4
Value of X
READ X
10000
SUB 5000
5000
ADD 3000
13000
WRITE X
After the implementation of both the transactions the value X is 13000 whereas the semantically correct value should be 8000. The trouble occurred as the update made by T3 has been overwritten by T4. The root cause of the trouble was the fact that both the transactions had read the value of X as 10000. Therefore one of the two updates has been lost and we say that a lost update has occurred.
There is one more way in which the lost updates can happen. Consider the following part of some transactions:
T5
T6
Value of x originally
2000
UPDATE X
3000
4000
ROLLBACK
Here T5 & T6 updates the similar item X. After that T5 decides to undo its action and rolls back causing the value of X to go back to the original value that was 2000. In this case also the update performed by T6 had got lost and a lost update is said to have happened.
State the data flow diagram of functional model Any action initiated by transition in the state diagram can be extended into an entire data flow diagram in functional model. Th
Write a query to define tables students and teachers as sub tables of people? Create table students of student under people Create table teachers of teacher under people
Which method is used to key transformation ? A hash method is used to key transformation.
Explain Relational model and their use in DBMS? Relational Model - The relational model was first introduced through E.F. Codd of the IBM Research in the year of 1970. The mode
write short note on mobile database
Fragmentation: It is definite as partitioning of a relation into various fragments.Every fragment can be stored at a dissimilar site.
The advantages of a database management system (DBMS) include :- Data integrity and elimination of duplication.
What is conceptual schema? The schemas at the view level are known as subschema that describe dissimilar views of the database.
What are the causes of bucket overflow in a hash file organization? What can be done to reduce the occurrence of bucket overflow? When a record is inserted, the bucket to that
as a customer service employee, explain five measures you would recommend a displeased student to patronise a school canteen
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd