1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
3 years ago
5

Why concurrency control is needed in transaction.

Computers and Technology
1 answer:
choli [55]3 years ago
6 0

Explanation:

Concurrency Control in Database Management System is a procedure of managing simultaneous operations without conflicting with each other. It ensures that Database transactions are performed concurrently and accurately to produce correct results without violating data integrity of the respective Database.And The ACID properties, in totality, provide a mechanism to ensure correctness and consistency of a database in a way such that each transaction is a group of operations that acts a single unit, produces consistent results, acts in isolation from other operations and updates that it makes are durably stored.

You might be interested in
Making the data impossible to recover even by applying physical forensics methods is known as __________ of media.
madam [21]

Answer:

Anti-Forensic Techniques.

Explanation:

Anti-Forensic Techniques are thsoe techniques used to deviate the Forensic tools by injecting fake informations, hiding information, planting bugs, editing or erasing information, rendering it impossible to recover the data. It is a criminal way of hacking approach that restrains Forensics to find the hackers.

Anti-Forensic tools and techniques works in oppose to the Forensic tools and techniques that tries to recover the data, locate the hacker.

Thus the correct answer is anti-forensic techniques.

3 0
3 years ago
Self contained sequences of actions to be performed are?
Firlakuza [10]

Answer:

Self contained sequences of actions to be performed are algorithms. - b

6 0
2 years ago
. Write programming code in C++ for school-based grading system
AleksAgata [21]

Explanation:

The grade must be calculated based on following pattern:

Average Mark RangeGrade91-100A181-90A271-80B161-70B251-60C141-50C233-40D21-32E10-20E2

Calculate Grade of Student in C++

To calculate grade of a student on the basis of total marks in C++ programming, you have to ask from user to enter marks obtained in 5 subjects. Now add marks of all the 5 subjects and divide it by 5 to get average mark. And based on this average mark, find grade as per the table given above:

// C++ Program to Find Grade of Student // -------codescracker.com------- #include<iostream> using namespace std; int main() { int i; float mark, sum=0, avg; cout<<"Enter Marks obtained in 5 Subjects: "; for(i=0; i<5; i++)

6 0
2 years ago
An information system interacts with its environment by: A. processing data. B. XML protocols. C. receiving data. D. systems ana
ASHA 777 [7]

Answer:

C. receiving data.

Explanation:

An information system interacts with its environment by receiving data in its raw forms and information in a usable format.

Information system can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

<em>Hence, the information system relies on the data it receives from its environment, processes this data into formats that are usable by the end users. </em>

7 0
2 years ago
When designing a suitable and safe flexibility training program, you should set reasonable and appropriate goals depending on wh
GalinKa [24]

Answer:

The following steps will help you design a safe and effective stretching program.

Explanation:

1. You will have to follow the ACSM's guidelines used for flexibility training.

2. evaluate your flexibility rate with the "sit-and-reach" test.

3. you have to also apply the basic principles of FITT in designing your own program.

4. have a "range-of-motion" tests performance.

5. make use of SMART guidelines when setting explicit flexibility goals.

7 0
2 years ago
Other questions:
  • Explain the function of the Ribbon in Microsoft Word.
    15·1 answer
  • Which of these options would likely have a better playback experience in your presentation?
    8·2 answers
  • Explain why an IT department and a user support group may disagree about the responsibility for the development of end-user appl
    8·1 answer
  • In Windows Vista, which button is used to create a new folder?
    7·1 answer
  • What computer is designed to meet the computing needs of several people simultaneously in a small to medium-size business enviro
    5·1 answer
  • Consider the following program where the zu format specifier is used to display as an integer the result of sizeof. #include #in
    11·1 answer
  • Your program will search for prime numbers. You will first ask the user for the range of values to search, and use for loops to
    6·1 answer
  • Assume the availability of a function is_prime. Assume a variable n has been associated with positive integer. Write the stateme
    15·1 answer
  • What is the difference between a crosstab query and a subquery?
    11·2 answers
  • Keira is creating an app for her cross-country team. Users will input their race times and the output will be a graph showing th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!