Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Transactions And Concurrency Management
Introduction
One of the main benefits of storing data in an integrated repository or a database is to permit sharing of it between multiple users. Various users access the database or perform transactions at the similar time. What if a user's transactions try to access a data item that is being used /modified by another transaction? This unit attempts to give details on how concurrent transactions are implemented under the control of DBMS. Though, in order to describe the concurrent transactions, first we must explain the term transaction.
Concurrent implementation of user programs is essential for good performance of DBMS, as concurrent running of various user programs keeps utilizing CPU time efficiently, as disk accesses are frequent and are relatively slow in case of DBMS. Also, a user's program may carry out a lot of operations on the data returned from DB, but DBMS is only concerned about what data is being written from / read / into the database.
1. Which relational algebra operations do not need the participating tables to be union-compatible? Ans: Join is the relational algebra operations that do not need the particip
what is view?explain
Give short note on the following terms:Dirty pages and ETL a.) Dirty pages. These are buffer pages which comprise modifications which haven't been written to disk. b.
Explain the difference between optimistic locking and pessimistic locking. Optimistic locking supposes no transaction conflict will occur and deals with the consequences if it
Column Constraints: NOT NULL, UNIQUE, CHECK, PRIMARY KEY, DEFAULT, REFERENCES, On delete Cascade : Using this key whenever a parent row is removed in a referenced
A video rental company has several branches. The data held on each branch is the branch address made up of street, city, state, and zip code, and the telephone number. Ea
What are attributes? Give examples. An entity is shown by a set of attributes. Attributes are descriptive properties possessed by every member of an entity set. Example: pos
Explain the Weak Entity Set An Entity set which does not have sufficient attribute to make a primay key is known as weak entity set. For instance, dependents of an employee in
Describe the functions and features of foreign key? Foreign Key : The primary key of one file or table that is implanted in another file or table to implement the relationships
what is difference between circular inked lust and grunded linked list
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd