411 views
1 votes
1 votes
Consider the following schedule $S$.

 

S: l1(A),l3(D),l1(B),u1(A),l2(C),l2(B),l1(D),l2(B),l3(C),l4(A),l4(C),l5(A);

 

Which of the following is a valid set of transactions that are potential victims?

 

 

1. {T1,T2,T3,T5}

 

2. {T1,T2}

 

3. {T1,T2,T3,T4}

 

4. {T1,T2,T3}

Please log in or register to answer this question.

Related questions

1 votes
1 votes
0 answers
4
gulsanchouhan asked Sep 28, 2017
341 views
Which of the following can be described as a programming model used to develop applications processing massive amounts of data in a distributed and/or parallel manner?1. ...