1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
3 years ago
11

2) Consider schedules S3, S4, and S5 below. Determine whether each schedule is strict, cascadeless, recoverable, or non-recovera

ble. You need to explain your reason.
S3: r1(x), r2(z), r1(z), r3(x), r3(y), w1(x), c1, w3(y), c3, r2(y), w2(z),w2(y),c2


S4: r1(x), r2(z), r1(z), r3(x), r3(y),w1(x),w3(y), r2(y),w2(z),w2(y), c1,c2, c3


S5: r1(x), r2(z), r3(x), r1(z), r2(y), r3(y), w1(x), c1, w2(z), w3(y), w2(y), c3, c2
Engineering
1 answer:
gulaghasi [49]3 years ago
7 0

Answer:

Explanation:

Consider schedules S3, S4, and S5 below. Determine whether each schedule is strict, cascadeless, recoverable, or non-recoverable. You need to explain your reason.

S3: r1(x), r2(z), r1(z), r3(x), r3(y), w1(x), c1, w3(y), c3, r2(y), w2(z),w2(y),c2

S4: r1(x), r2(z), r1(z), r3(x), r3(y),w1(x),w3(y), r2(y),w2(z),w2(y), c1,c2, c3

S5: r1(x), r2(z), r3(x), r1(z), r2(y), r3(y), w1(x), c1, w2(z), w3(y), w2(y), c3, c2

Strict schedule:

A schedule is strict if it satisfies the following conditions:

Tj reads a data item X after Ti has written to X and Ti is terminated means aborted or committed.

Tj writes a data item X after Ti has written to X and Ti is terminated means aborted or committed.

S3 is not strict because In a strict schedule T3 must read X after C1 but here T3 reads X (r3(X)) before Then T1 has written to X (w1(X)) and T3 commits after T1.

S4 is not strict because In a strict schedule T3 must read X after C1, but here T3 reads X (r3(X)) before T1 has written to X (w1(X)) and T3 commits after T1.

S5 is not strict because T3 reads X (r3(X)) before T1 has written to X (w1(X))

but T3 commits after T1. In a strict schedule T3 must read X after C1.

Cascadeless schedule:

Cascadeless schedule follows the below condition:

Tj reads X only? after Ti has written to X and terminated means aborted or committed.

S3 is not cascadeless schedule because T3 reads X (r3(X)) before T1 commits.

S4 is not cascadeless schedule because T3 reads X (r3(X)) before T1 commits.

S5 is not cascadeless schedule because T3 reads X (r3(X)) before T1 commits or T2 reads Y (r2(Y)) before T3 commits.

But while come to the definition of cascadeless schedules S3, S4, and S4 are not cascadeless, and T3 is not affected if T1 is rolled back in any of the schedules, that is,

T3 does not have to roll back if T1 is rolled back. The problem occurs because these

schedules are not serializable.

Recoverable schedule:

Schedule that follows the below condition:

-----Tj commits after Ti if Tj has?read any data item written by Ti.

Ci > Cj means that Ci happens before Cj. Ai denotes abort Ti. To test if a schedule is

recoverable one has to include abort operations. Thus in testing the recoverability abort

operations will have to used in place of commit one at a time. Also the strictest condition is

------where a transaction neither reads nor writes to a data item, which was written to by a transaction that has not committed yet.

If A1?>C3>C2, then schedule S3 is recoverable because rolling back of T1 does not affect T2 and

T3. If C1>A3>C2. schedule S3 is not recoverable because T2 read the value of Y (r2(Y)) after T3 wrote X (w3(Y)) and T2 committed but T3 rolled back. Thus, T2 used non- existent value of Y. If C1>C3>A3, then S3 is recoverable because roll back of T2 does not affect T1 and T3.

Strictest condition of schedule S3 is C3>C2.

If A1?>C2>C3, then schedule S4 is recoverable because roll back of T1 does not affect T2 and T3. If C1>A2>C3, then schedule S4 is recoverable because the roll back of T2 will restore the value of Y that was read and written to by T3 (w3(Y)). It will not affect T1. If C1>C2>A3, then schedule S4 is not recoverable because T3 will restore the value of Y which was not read by T2.

You might be interested in
What is the IMA of this pulley belt system if the diameter of the input
Stella [2.4K]

Answer:

2.8

Explanation:

The ideal mechanical advantage of the pulley IMA  = D'/D where D' = diameter of output pulley = 7 inches and D = diameter of input pulley = 2.5 inches

So, IMA = D'/D

= 7/2.5

= 2.8

So, the ideal mechanical advantage of the pulley IMA = 2.8

8 0
3 years ago
What are the functions of each computer program
Ludmilka [50]
A function is a block of organized, reusable code that is used to perform a single, related action. Functions provide better modularity for your application and a high degree of code reusing. ... Different programming languages name them differently, for example, functions, methods, sub-routines, procedures, etc.
4 0
3 years ago
Bind hole, 38 diameter, .50 deep
agasfer [191]

Answer:

59.69021

Explanation:

38/.5 x 3.14159

4 0
2 years ago
Now that we have a second enemy, you will need to make some changes to the script that is attached to your backdrop. Look at tha
JulsSmile [24]

Answer:

<u><em>≡</em></u>

Explanation:

8 0
3 years ago
"Using your favorite search engine and the resources of your library, develop a set of recommendations regarding the possible us
alina1380 [7]

Answer:

Cloud computing services are going to be very important to supporting Ashville's mobile app since it has different uses. These applications uses include; data storage, as well as helping to provide network to any business data related work. This will improve the city of Ashville's mobile app operations considerably.

The benefits of using cloud computing are; it allows a business managers to be more concerned with running the business themselves rather than maintaining the data center. The use of cloud computing allows a company's IT administrators to focus on managing the company's operations, thereby allowing performance to be enhanced of the business enterprise.

A commercial company is able to create new technologies more rapidly with the use of cloud computing. Furthermore, the enterprise will be able to automate its activities using cloud computing. Cloud computing is also very important as it is more affordable and thus promotes the company's growth in the market. Cloud computing is also enhancing the global presence of the Ashville mobile app. The drawbacks of using cloud computing include the following; due to using the cloud infrastructure, the company's performance may be unreliable. People believe that cloud computing is not reliable and that cloud computing may not be secure at last and can't always be right for all workloads.

Explanation:

5 0
3 years ago
Other questions:
  • A mass of 0.3 kg is suspended from a spring of stiffness 0.4 N/mm. The damping is 3.286335345 kg/s. What is the undamped natural
    5·1 answer
  • When choosing a respirator for your job, you must conduct a _____ test.
    15·1 answer
  • [4 points] Does the green LED emit light when you connect the banana plug wires across it? What does that say about the threshol
    13·1 answer
  • Output all combinations of character variables a, b, and c. If a = 'x', b = 'y', and c = 'z', then the output is: xyz xzy yxz yz
    14·1 answer
  • -0-1"<br> -0<br> -20<br> -15<br> -10<br> 0<br> -5
    9·1 answer
  • Ball joints on a vehicle equipped with MacPherson struts are being inspected for wear. Which of the following would be the corre
    11·1 answer
  • Acoke can with inner diameter(di) of 75 mm, and wall thickness (t) of 0.1 mm, has internal pressure (pi) of 150 KPa and is suffe
    9·1 answer
  • This just a question that I keep forgetting, are lightskin people black.??
    6·2 answers
  • Identify five safety hazards that should be included in the design of the school
    6·1 answer
  • Ferroconcrete is reinforced concrete that combines concrete and ________. A. Lead c. Copper b. Iron d. Aluminum.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!