Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Strict 2PL:Though, this basic 2PL suffers from the trouble that it can result into loss of isolation / atomic property of transaction as theoretically speaking once a lock is released on a data item it can be changed by another transaction before the first transaction aborts or commits.
To leave such a situation we use strict two phase locking. The strict 2PL is graphically depicted in Figure. Though, the basic drawbacks of strict 2PL are that it restricts concurrency as it locks the item afar the time it is required by a transaction.
Figure: Strict Two Phase Locking
Does the two phase locking solve all the problems of concurrent transactions? No, the strict 2PL answers the problem of concurrency and atomicity, though it introduces another problem.
What are the function of DBA?
Short Note on mid Square Method of hashing? Mid square method of hashing: In the method midsquare hashing, the key is squared and the address selected from the center of the s
Question: (a) What are decision support systems, and what role do they play in the business environment? (b) Data mining is a knowledge discovery process of automated extr
Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm
What is a Data Flow Diagram? Data Flow Diagram: A data flow diagram is the graph that shows flow of data values from their sources in objects in the course of processes whic
Define Catalog and meta data ? A catalog is a compilation of records elaborating the contents of a particular collection or group of collections. Metadata (Meta data, or someti
What is primary Key Explain? Primary Key - Primary key is one of the candidate keys. It should be selected such in which its attribute values are never, or very rarely, chang
Explain the Weak Entity Set An Entity set which does not have sufficient attribute to make a primay key is known as weak entity set. For instance, dependents of an employee in
wh
Q. Explain the terms key constraints participation constraints and mapping caradinalities in ER model. Participation Constraints : The participation of an entity set E i
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd