The Gateway to Computer Science Excellence
+1 vote
Consider the following schedule $S$.


S: l1(A),l3(D),l1(B),u1(A),l2(C),l2(B),l1(D),l2(B),l3(C),l4(A),l4(C),l5(A);


Which of the following is a valid set of transactions that are potential victims?



1. {T1,T2,T3,T5}


2. {T1,T2}


3. {T1,T2,T3,T4}


4. {T1,T2,T3}
in Databases by (255 points) | 30 views

Please log in or register to answer this question.

Related questions

Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true
50,833 questions
57,723 answers
107,782 users