Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Software failures: In such cases, a software error abruptly stops the implementation of the current transaction (or all transactions), therefore leading to losing the state of program implementation and the contents / state of the buffers. But what is a buffer? A buffer is the portion of RAM that kept the partial contents of database that is currently needed by the transaction. The software failures can further be subdivided as:
a) Application or Statement program failure
b) DBMS software failure
c) Failure due to viruses
d) Operating system failure
A Statement of program may cause abnormal termination if it does not implement totally. This happens if during the implementation of a statement, an integrity constraint gets desecrated. This leads to irregular termination of the transaction because of which any prior updates made by the transaction may still get reflected in the database going it in an inconsistent state.
A failure of transaction can happen if some code in a transaction program leads to its abnormal termination. For instance, a transaction can go into an infinite loop.
In such a case the only technique to break the loop is to abort the program. Likewise, the failure can be traced to the DBMS or operating system and transactions are aborted abruptly. Therefore part of the transaction that was implemented before abort may cause some updates in database, and therefore the database is updated only partially which leads to an inconsistent state of database.
What are the objectives of query processing? Ans: The objectives of query processing is to transform a query written in a high level language into a accurate and efficien
growing phase and shrinking phase are disjoint, why ?
This assignment is worth 45% of your final grade for this module. Marks will be awarded as follows: Prototypes (wireframe and web based prototype) You are expected
Explain Hashing techniques The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with
wh
Name the various privileges in SQL? A) Delete B) Select C) Insert D) Update
what is definition hierarchical data model
What is the used of specifying alias? Specifying alias: is used to rename column or attribute in a table.
Decompose the table with the following description and functional dependencies into a set of equivalent tables normalized to 3NF or BCNF. A long-standing international treaty am
i need help for assignment ..
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd