1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
3 years ago
5

1. Consider a database with object X and Y and assume that there are two transactions T1 and T2. Transaction T1 reads objects X

and Y and then writes object X. Transaction T2 reads objects X and Y and writes objects X and Y. (a) Give an example schedule with actions of transaction T1 and T2 on objects X and Y that results in a write-read conflict. (b) Give an example schedule with actions of transaction T1 and T2 on objects X and Y that results in a read-write conflict. (c) Give an example schedule with actions of transaction T1 and T2 on objects X and Y that results in a write-write conflict. (d) For each of the schedules, show that strict 2PL disallows the schedule.
Computers and Technology
1 answer:
Tcecarenko [31]3 years ago
7 0

Answer:

See explaination

Explanation:

1. The following schedule results in a write-read conflict:

T2:R(X), T2:R(Y), T2:W(X), T1:R(X) ...

T1:R(X) is a dirty read here.

2. The following schedule results in a read-write conflict:

T2:R(X), T2:R(Y), T1:R(X), T1:R(Y), T1:W(X) ...

Now, T2 will get an unrepeatable read on X.

3. The following schedule results in a write-write conflict:

T2:R(X), T2:R(Y), T1:R(X), T1:R(Y), T1:W(X), T2:W(X) ...

Now, T2 has overwritten uncommitted data.

Below history will show that T1 and T2 preserves the consistency requirement of the database

T1 T2:R1X, R1Y, W1X, c1, R2X, R2Y, W2X, W2Y, c2

T2 T1:R2X, R2Y, W2X, W2Y, c2,R1X, R1Y, W1X, c1

b)

To eliminate both undo and redo, all of T’s updates must be recorded in the stable database in a single atomic operation when T commits

We can implement this strategy using Shadowing and Stable database techniques.

You might be interested in
Jane volunteers at an orphanage called ""we are one"" and is developing a website to seek financial assistance. Which server add
Oksi-84 [34.3K]

Based in the provided information, the server address she should use is www.weareone.org.

<h3>What is a web server address?</h3>

The web server address serves as external IP address which establish connection between the computer to the Internet Service Provider so that one can access domains worldwide.

Therefore, she should use www.weareone.org since she's dealing with we are one""  organization.

Learn more about web server address at:

brainly.com/question/19347842

6 0
3 years ago
True or False? To reduce hazards, flexible cords must connect to devices and fittings in ways that prevent tension at joints and
jek_recluse [69]
The Right Answer Is True.

3 0
4 years ago
write three questions you have about jow geography shapes economic activies in Australia and the pacific…
SVEN [57.7K]

Answer:

Are the trades gonna be harder or easier?

How did geography shape conomic activies in Australia and the pacific?

How did the land get seperated?

ps im not good with these kind of stuff dk y u chose me to do it

5 0
3 years ago
Using a pin or password in addition to tpm is an example of what type of authentication?
anzhelika [568]
Considering it is private i would say security?
3 0
3 years ago
Data for which there is temporarily no room in ram is diverted to wear on your computer?
ivanzaharov [21]


The answer to your question is the Paging file which temporarily uses memory from your disk to become part of your virtual memory to remove the load from your RAM (Random Access Memory). This also helps your system to support any application that exceed its physical memory capability.

5 0
3 years ago
Other questions:
  • Which resource helps a user access a cloud service?
    13·2 answers
  • To select a new theme for a slideshow use the blank tile in the ribbon
    9·2 answers
  • This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.
    14·2 answers
  • Key differences between software and books include all of the following except
    15·2 answers
  • An investor’s stock portfolio consists of four Exchange Traded Funds (SPY, QQQ, EEM, and VXX). Write a program that requests the
    10·1 answer
  • Create a spreadsheet that lists the ten currencies you chose. For each currency, enter an amount and create a
    12·1 answer
  • Write a python program to print numbers from 100 to 50 using for loop.<br> I NEED THIS URGENT PLEASE
    9·1 answer
  • A file named "dogs.txt" exists and has 60 lines of data. You open the file with the following line of code.
    5·1 answer
  • Write a program that asks the user to enter a positive integer that represents a number in the decimal system and then displays
    12·1 answer
  • MOA115 Medical Records and Insurance
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!