1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
san4es73 [151]
3 years ago
6

Consider the following protocol for concurrency control. The database system assigns each transaction a unique and strictly incr

easingly id at the start of the transaction. For each data item, the database system also keeps the id of the last transaction that has modified the data item, called the transaction-id of the data item. Before a transaction T wants to read or write on a data item A, the database system checks whether the transaction-id of A is greater than the id of T . If this is the case, the database system allows T to read/write A. Otherwise, the database system aborts and restarts T.
Question1:

Does this protocol allow only a serializable schedule for transactions? If not, you may suggest a change to the protocol so that all schedules permitted by this protocol are serializable. You should justify your answer.

Question 2:

Propose a change to this protocol or the modified version you have designed for part (a) that increases its degree of concurrency, i.e., it allows more serializable schedules.
Computers and Technology
1 answer:
nasty-shy [4]3 years ago
4 0

Answer:

(a) yes, this protocol allows only serializable schedules for transactions as due to this the system maintains it's consistency. As in this protocol a unique transaction id is being assigned and with the help of that transaction id the system would be able to identify the process which has taken place in what particular order. For example, in case of bank transfers

balance = 1000 transaction id 100

write ADD 200 transaction id 101

write SUB 1100 transaction id 102

write ADD 900 transaction id 103

in here with the help of transaction id we can check which operation has happened in which order, if not then some operation will not happen like 102 immediately after 100 and skipping 101

(b) the modified version of this protocol would be to also consider the time of transaction and take this factor in the consideration

You might be interested in
To print data sideways on a piece of paper, use the _______ page orientation setting.
Lostsunrise [7]
Landscape orientation .
4 0
4 years ago
Read 2 more answers
Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
inessss [21]

The statement 'most spyware programs are benign in that they do not perform malicious acts or steal data' is false.

In the field of computer studies, spyware is malicious software that is installed inside a system without the knowledge of the user. Such an act is done either to harm the data in the system or to steal information from the system. Spywares invade the privacy of a user and can lead to harmful results.

Spyware can be a serious threat to internet users as it can even track the login credentials of a user. Hence, spyware is not at all benign as it can impose serious threats to a user. Malicious activities and stealing of data are done through spyware.

To learn more about spyware, click here:

brainly.com/question/21507976

#SPJ4

3 0
1 year ago
During an interview, your non-verbal communication (body language, gestures, tone of voice, speed of talking,
kompoz [17]

Answer:

True

Explanation:

People will judge you based upon your non-verbal communication. If your non-verbal communication is bad then you might not get the job.

8 0
4 years ago
Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it app
Natali [406]

Answer:

Following are the memo to the vice president:

Explanation:

In this question, the president claims, that he got a threatening e-mail from the Maui worker. HR acknowledged that all of the workers should always be dismissed, in its protection, that worker claims that he did not send the message but he does not recognize why the message implies him return address. Here is a note for the vice president, who explains how an employee could have produced an email and made it look to be from another worker's account. That stuff we want will be progressively explained as follows:

a) The manipulating and e-mail used only by spammers and attackers were called this technique. In the SMTP server, it sends messages, that you can set up to send your spammer to the email addresses. Instead of a mail confirmation, I d the forger requires the receiver to see the next employee I d email. that recipient doesn't understand who sent the message.

b) The e-mail Systems information allowing for accessible transfer is used by the intruder or forger. It  must use an attacker order to verify communication with the SMTP server command:  

telnet smpt.server.name 25    

Its name of the SMTP server is smpt.domain.name, and the port is 25.

c) when the last stage is successful as well as a link created, this order to imitate an email account only with command can be entered:

MAIL from: Email-id

It creates a problem for the worker that sends the e-mail with the same id

d) Hacker sets the email of the receiver to:  

RCPT to: boss email-id  

It sets the beneficiary as the e-mail above.  

e) By entering an order, you can create the email data:  

DATA It may also adjust the date by using command and Any date we would like to use.  

Date: (date you would like)  

We should settle on the following:  

Subject: (your topic)

f) We press Insert after the topic is written. In this body can then be e-mail forms. It produces the text.  

g) its email forged is forwarded.

3 0
4 years ago
In addition to the four primary computer operations, today's computers almost always perform ____ functions.
NeX [460]

The correct answer is:    " information "  .

_________________________

<u>Note</u>:  In addition to the [4 (four) "primary computer operations" —  which are:  

 "input, processing, output, and storage" ] — today's computers almost always perform <u>  information  </u> functions.

_________________________

5 0
3 years ago
Other questions:
  • In fiberoptic cable, the signal source is__________waves
    7·1 answer
  • Which of the following identifies the patterns used for each data series in a chart?
    13·1 answer
  • is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources th
    9·1 answer
  • A(n) _______________ is a collection of configuration and security settings that an administrator has created in order to apply
    14·1 answer
  • Jane is creating a slide that will have a large heading and number of bullet points below it. What slide format should she use?
    12·1 answer
  • Which of the following substances increases in quantity during repititive muscle contraction during oxygen deficti ?
    11·1 answer
  • You plan on using cost based pricing. The cost of your product is 10, and you are planning a 30% mark up. What should the price
    14·1 answer
  • Which generation of computer is most popular and why?
    9·1 answer
  • We call any device connected to the Internet a(n) ________. Group of answer choices router host IP client
    9·1 answer
  • Most cell phones and tablets have solid-state storage drives. internal hard disk drives. internal cloud storage. external hard d
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!