1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
4 years ago
5

Why concurrency control is needed in transaction.

Computers and Technology
1 answer:
choli [55]4 years ago
6 0

Explanation:

Concurrency Control in Database Management System is a procedure of managing simultaneous operations without conflicting with each other. It ensures that Database transactions are performed concurrently and accurately to produce correct results without violating data integrity of the respective Database.And The ACID properties, in totality, provide a mechanism to ensure correctness and consistency of a database in a way such that each transaction is a group of operations that acts a single unit, produces consistent results, acts in isolation from other operations and updates that it makes are durably stored.

You might be interested in
Can u tell me the answers to this table ​
Sholpan [36]

: im sorry what dose it say it is too blurry

6 0
3 years ago
The width to height proportion of a monitor is known as the
JulijaS [17]
The width-to-height proportion of a monitor is known as the aspect ratio.
6 0
3 years ago
5 band resistor with two red bands, two gold bands, one purple band?
Mamont248 [21]

According to below picture, two gold bands on a 5 band resistor cannot happen. What is the order of the bands?

8 0
3 years ago
Summarize how the components of health are related to wellness ​
Valentin [98]
Physical wellness indicates a high level of endurance, flexibility and strength... Mental and emotional wellness focuses on an acceptance and agreement with ones emotions and feelings.
9 0
4 years ago
DIMM is a type of which component? <br> 1.CPU<br> 2.RAM<br> 3.expansion slot<br> 4.chipset
gulaghasi [49]

Answer:

2.RAM

Explanation:

BECAUSE IT CAN BE EASILY VIRIFIED ON THE INTERNET

7 0
3 years ago
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • Put the following five steps in the order in which you would perform them to use the Paste Special function: ____. 1. Select and
    5·1 answer
  • What type of malicious software masquerades as legitimate software to entice the user to run it?
    14·1 answer
  • It is essential that a security professional is able to resolve and respond to cyber law inquiries and incidents while avoiding
    14·1 answer
  • Which of the following information is most important to include in a timeline
    14·2 answers
  • Which of the following inputs help robotic vacuum cleaners maneuver around obstacles?
    13·2 answers
  • Need help!! Write an interactive program that reads lines of input from the user and converts each line into "Pig Latin." Pig La
    9·1 answer
  • A or an is a simple chip with two or more processor core
    5·1 answer
  • Anybody know this? Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. M
    11·1 answer
  • What is the output?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!