What are the various states of transaction process, Database Management System

Assignment Help:

What are the various states through which a transaction passes through in its lifetime?  Briefly discuss all the events that causes transition from one state to another.  

Ans:   A transaction can be referred to be an atomic operation by the user, but in fact it goes through a number of states during its lifetime as given as follows: 

a. Active, the initial state; the transaction stays in this state when it is executing

b. Partially Committed, later than the initial statement has been executed

c. Failed, later than the discovery that normal execution can no longer proceed

d. Aborted, later than the transaction has been rolled back and the database has been restored to its state prior to the beginning of the transaction

e. Committed, after successful completion.

2156_What are the various states of Transaction Process.png

It is supposed that before a transaction starts, the database is in a consistent state. A transaction starts while the first statement of the transaction is executed; it becomes active. Afterward any outcome, the database will be referred in consistent state.


Related Discussions:- What are the various states of transaction process

Describe models which define the operations on classes, Describe briefly mo...

Describe briefly models which define the operations on classes. The three models which are used to define operations on classes are as: Object Model = data dictionary + Obje

Modify - referential integrity, Update or Modify operation alters the exist...

Update or Modify operation alters the existing values. If these operations alter the value that is the foreign key also, the only check need is the similar as that of the Insert op

Describe different steps of object-oriented design process, Describe differ...

Describe different steps of the object-oriented design process.  The broad steps of the object-oriented design process are: a. Define context and modes of use of the system

Give some encryption techniques, Give some encryption techniques? A)  D...

Give some encryption techniques? A)  DES  B) AES  C) Public key encryption

What is a foreign key, What is a foreign key, and what is it used for? ...

What is a foreign key, and what is it used for? A foreign key is used to establish relationships between relations in the relational model. Technically, a foreign key is a colu

BI, (a) Why did SAP introduce the extended star schema?

(a) Why did SAP introduce the extended star schema?

What is a phantom deadlock, What is a Phantom Deadlock? In distributed...

What is a Phantom Deadlock? In distributed deadlock detection, the delay in propagating local information might cause the deadlock detection algorithms to recognize deadlocks

Division operation, To do the division operation R1 ÷ R2, R2 should be a co...

To do the division operation R1 ÷ R2, R2 should be a correct subset of R1. In the following example R1 have attributes A and B and R2 have only attribute B so R2 is a correct subse

Relationship for college database, Using the concepts defined previous, we ...

Using the concepts defined previous, we have identified that strong entities in COLLEGE database are FACULTY, STUDENT, COURSE and DEPARTMENT. This database also has one weak entity

The second normal form (2nf), The Second Normal Form (2NF) Definition: ...

The Second Normal Form (2NF) Definition: A relation is in 2NF if it is in 1NF and each non-key attribute is fully dependent on each candidate key of the relation. Some of th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd