Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged transaction-and-concurrency
1
votes
1
answer
91
ISRO2020-22
Raymonds tree based algorithm ensures no starvation, but deadlock may occur in rare cases no deadlock, but starvation may occur neither deadlock nor starvation can occur deadlock may occur in cases where the process is already starved
Raymonds tree based algorithm ensuresno starvation, but deadlock may occur in rare casesno deadlock, but starvation may occurneither deadlock nor starvation can occurdead...
Satbir
1.8k
views
Satbir
asked
Jan 13, 2020
Databases
isro-2020
databases
transaction-and-concurrency
normal
+
–
1
votes
1
answer
92
ACE Test series: Database
ushamya
973
views
ushamya
asked
Jun 7, 2019
Databases
transaction-and-concurrency
ace-test-series
databases
+
–
0
votes
1
answer
93
Any good resource for developing concepts on transactions in SQL?
aditi19
471
views
aditi19
asked
May 9, 2019
Databases
sql
transaction-and-concurrency
databases
+
–
0
votes
0
answers
94
DBMS Korth Edition 4 Exercise 16 Question 31 (Page No. 636)
Give example schedules to show that if any of lookup, insert or delete do not lock the next key value, the phantom phenomenon could go undetected.
Give example schedules to show that if any of lookup, insert or delete do not lock the next key value, the phantom phenomenon could go undetected.
akash.dinkar12
397
views
akash.dinkar12
asked
Apr 3, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
95
DBMS Korth Edition 4 Exercise 16 Question 29 (Page No. 635)
Explain the reason for the use of degree-two consistency. What disadvantages dos this approach have ?
Explain the reason for the use of degree-two consistency. What disadvantages dos this approach have ?
akash.dinkar12
306
views
akash.dinkar12
asked
Apr 3, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
96
DBMS Korth Edition 4 Exercise 16 Question 28 (Page No. 635)
Devise a timestamp-based protocol that avoids the phantom phenomenon.
Devise a timestamp-based protocol that avoids the phantom phenomenon.
akash.dinkar12
334
views
akash.dinkar12
asked
Apr 3, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
2
answers
97
DBMS Korth Edition 4 Exercise 16 Question 27 (Page No. 635)
Explain the phantom phenomenon. Why may this phenomenon lead to an incorrect concurrent execution despite the use of the two-phase locking protocol ?
Explain the phantom phenomenon. Why may this phenomenon lead to an incorrect concurrent execution despite the use of the two-phase locking protocol ?
akash.dinkar12
658
views
akash.dinkar12
asked
Apr 3, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
1
answer
98
DBMS Korth Edition 4 Exercise 16 Question 26 (Page No. 635)
Consider the timestamp ordering protocol, and two transactions, one that writes two data items p and q, and another that reads the same two data items. Give a schedule whereby the timestamp test for a write operation fails and ... but are unable to complete their task because of interaction with the other processes, is called a live lock.)
Consider the timestamp ordering protocol, and two transactions, one that writes two data items p and q, and another that reads the same two data items. Give a schedule wh...
akash.dinkar12
1.1k
views
akash.dinkar12
asked
Apr 3, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
99
DBMS Korth Edition 4 Exercise 16 Question 25 (Page No. 635)
If deadlock is avoided by deadlock avoidance schemes, is starvation still possible ? Explain your answer.
If deadlock is avoided by deadlock avoidance schemes, is starvation still possible ? Explain your answer.
akash.dinkar12
310
views
akash.dinkar12
asked
Apr 3, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
1
answer
100
DBMS Korth Edition 4 Exercise 16 Question 24 (Page No. 635)
Under what conditions is it less expensive to avoid deadlock than to allow deadlocks to occur and then to detect them ?
Under what conditions is it less expensive to avoid deadlock than to allow deadlocks to occur and then to detect them ?
akash.dinkar12
418
views
akash.dinkar12
asked
Apr 3, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
101
DBMS Korth Edition 4 Exercise 16 Question 23 (Page No. 635)
Explain why the following technique for transaction execution may provide better performance than just using strict two-phase locking: First execute the transaction without acquiring any locks and without performing any writes to the database ... , rerun the transaction using strict two-phase locking. (Hint: Consider waits for disk I/O.)
Explain why the following technique for transaction execution may provide better performance than just using strict two-phase locking: First execute the transaction witho...
akash.dinkar12
285
views
akash.dinkar12
asked
Apr 3, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
102
DBMS Korth Edition 4 Exercise 16 Question 22 (Page No. 635)
Under a modified version of the timestamp protocol, we require that a commit bit be tested to see whether a read request must wait. Explain how the commit bit can prevent cascading abort. Why is this test not necessary for write requests?
Under a modified version of the timestamp protocol, we require that a commit bit be tested to see whether a read request must wait. Explain how the commit bit can prevent...
akash.dinkar12
213
views
akash.dinkar12
asked
Apr 3, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
103
DBMS Korth Edition 4 Exercise 16 Question 21 (Page No. 635)
For each of the following protocols, describe aspects of practical applications that would lead you to suggest using the protocol, and aspects that would suggest not using the protocol: $ $ Two-phase locking $ $ Two-phase ... $ $ Timestamp ordering $ $ Validation $ $ Multi version timestamp ordering $ $ Multi version two-phase locking
For each of the following protocols, describe aspects of practical applications that would lead you to suggest using the protocol, and aspects that would suggest not usin...
akash.dinkar12
459
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
104
DBMS Korth Edition 4 Exercise 16 Question 20 (Page No. 635)
Show that there are schedules that are possible under the two-phase locking protocol, but are not possible under the timestamp protocol, and vice versa.
Show that there are schedules that are possible under the two-phase locking protocol, but are not possible under the timestamp protocol, and vice versa.
akash.dinkar12
300
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
105
DBMS Korth Edition 4 Exercise 16 Question 18 (Page No. 634)
Use of multiple-granularity locking may require more or fewer locks than an equivalent system with a single lock granularity. Provide examples of both situations, and compare the relative amount of concurrency allowed.
Use of multiple-granularity locking may require more or fewer locks than an equivalent system with a single lock granularity. Provide examples of both situations, and com...
akash.dinkar12
425
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
106
DBMS Korth Edition 4 Exercise 16 Question 17 (Page No. 634)
Although SIX mode is useful in multiple-granularity locking, an exclusive and intend-shared (XIS) mode is of no use. Why is it useless ?
Although SIX mode is useful in multiple-granularity locking, an exclusive and intend-shared (XIS) mode is of no use. Why is it useless ?
akash.dinkar12
255
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
107
DBMS Korth Edition 4 Exercise 16 Question 16 (Page No. 634)
In multiple-granularity locking, what is the difference between implicit and explicit locking ?
In multiple-granularity locking, what is the difference between implicit and explicit locking ?
akash.dinkar12
204
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
108
DBMS Korth Edition 4 Exercise 16 Question 15 (Page No. 634)
When a transaction is rolled back under timestamp ordering, it is assigned a new timestamp. Why can it not simply keep its old timestamp ?
When a transaction is rolled back under timestamp ordering, it is assigned a new timestamp. Why can it not simply keep its old timestamp ?
akash.dinkar12
199
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
1
votes
0
answers
109
DBMS Korth Edition 4 Exercise 16 Question 14 (Page No. 634)
In timestamp ordering,$W-timestamp(Q)$ denotes the largest timestamp of any transaction that executed $write(Q)$ successfully. Suppose that, instead, we defined it to be the timestamp of the most recent transaction to execute $write(Q)$ successfully.Would this change in wording make any difference ? Explain your answer.
In timestamp ordering,$W-timestamp(Q)$ denotes the largest timestamp of any transaction that executed $write(Q)$ successfully. Suppose that, instead, we defined it to be ...
akash.dinkar12
226
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
1
votes
0
answers
110
DBMS Korth Edition 4 Exercise 16 Question 13 (Page No. 634)
Consider a database system that includes an atomic increment operation, in addition to the read and write operations. Let V be the value of data item X. The operation $increment(X)$ by C sets the value of ... of increment mode locks allows for increased concurrency. (Hint: Consider check-clearing transactions in our bank example.)
Consider a database system that includes an atomic increment operation, in addition to the read and write operations. Let V be the value of data item X. The operation $in...
akash.dinkar12
627
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
111
DBMS Korth Edition 4 Exercise 16 Question 12 (Page No. 633-634)
Locking is not done explicitly in persistent programming languages. Rather, objects (or the corresponding pages) must be locked when the objects are accessed. Most modern operating systems allow the user to set access ... how the access-protection mechanism can be used for page-level locking in a persistent programming language.
Locking is not done explicitly in persistent programming languages. Rather, objects (or the corresponding pages) must be locked when the objects are accessed. Most modern...
akash.dinkar12
366
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
112
DBMS Korth Edition 4 Exercise 16 Question 11 (Page No. 633)
Consider a variant of the tree protocol called the forest protocol. The database is organized as a forest of rooted trees. Each transaction $T_i$ must follow the following rules: $ $ The first lock in each tree may be on ... relocked by Ti after it has been unlocked by $T_i$. Show that the forest protocol does not ensure serializability.
Consider a variant of the tree protocol called the forest protocol. The database is organized as a forest of rooted trees. Each transaction $T_i$ must follow the followin...
akash.dinkar12
667
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
1
votes
0
answers
113
DBMS Korth Edition 4 Exercise 16 Question 10 (Page No. 633)
Consider the following graph-based locking protocol that allows only exclusive lock modes, and that operates on data graphs that are in the form of a rooted directed acyclic graph. $ $ A transaction can lock any vertex first ... a lock on one of the parents of the vertex. Show that the protocol ensures serializability and deadlock freedom.
Consider the following graph-based locking protocol that allows only exclusive lock modes, and that operates on data graphs that are in the form of a rooted directed acyc...
akash.dinkar12
562
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
114
DBMS Korth Edition 4 Exercise 16 Question 9 (Page No. 633)
Consider the following graph-based locking protocol, which allows only exclusive lock modes, and which operates on data graphs that are in the form of a rooted directed acyclic graph. $ $ A transaction can lock any ... lock on the majority of the parents of that vertex. Show that the protocol ensures serializability and deadlock freedom.
Consider the following graph-based locking protocol, which allows only exclusive lock modes, and which operates on data graphs that are in the form of a rooted directed a...
akash.dinkar12
262
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
115
DBMS Korth Edition 4 Exercise 16 Question 8 (Page No. 633)
Consider the following extension to the tree-locking protocol, which allows both shared and exclusive locks: $ $ A transaction can be either a read-only transaction, in which case it can request only shared locks, ... , whereas update transactions must lock the root first. Show that the protocol ensures serializability and deadlock freedom.
Consider the following extension to the tree-locking protocol, which allows both shared and exclusive locks:$•$ A transaction can be either a read-only transaction, in ...
akash.dinkar12
430
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
116
DBMS Korth Edition 4 Exercise 16 Question 7 (Page No. 633)
Show by example that there are schedules possible under the tree protocol that are not possible under the two-phase locking protocol, and vice versa.
Show by example that there are schedules possible under the tree protocol that are not possible under the two-phase locking protocol, and vice versa.
akash.dinkar12
227
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
0
answers
117
DBMS Korth Edition 4 Exercise 16 Question 6 (Page No. 632)
Consider a database organized in the form of a rooted tree. Suppose that we insert a dummy vertex between each pair of vertices. Showthat, if we follow the tree protocol on the new tree, we get better concurrency than if we follow the tree protocol on the original tree.
Consider a database organized in the form of a rooted tree. Suppose that we insert a dummy vertex between each pair of vertices. Showthat, if we follow the tree protocol ...
akash.dinkar12
286
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
1
answer
118
DBMS Korth Edition 4 Exercise 16 Question 5 (Page No. 632)
Most implementations of database systems use strict two-phase locking. Suggest three reasons for the popularity of this protocol.
Most implementations of database systems use strict two-phase locking. Suggest three reasons for the popularity of this protocol.
akash.dinkar12
1.0k
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
1
answer
119
DBMS Korth Edition 4 Exercise 16 Question 4 (Page No. 632)
What benefit does rigorous two-phase locking provide ? How does it compare with other forms of two-phase locking ?
What benefit does rigorous two-phase locking provide ? How does it compare with other forms of two-phase locking ?
akash.dinkar12
315
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
2
answers
120
DBMS Korth Edition 4 Exercise 16 Question 3 (Page No. 632)
What benefit does strict two-phase locking provide ? What disadvantages result ?
What benefit does strict two-phase locking provide ? What disadvantages result ?
akash.dinkar12
332
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
Page:
« prev
1
2
3
4
5
6
7
8
9
...
14
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register