If we have database, then how can we tell the data in the “database is secured”. Also what is meant by “data validation”
SIKSHAPATH Latest Questions
Check whether the given schedules are conflict serializable or not S1 : R2(B)W2(A)R1(A)R3(A)W1(B)W2(B)W3(B) S2:R3(Y)W3(Z)R1(X)W1(X)W3(Y)W3(Z)R2(Z)R1(Y)W1(Y)R2(Y)W2(Y)
IF the system recovers from a crash, it constructs an undo-list and a redo-list. Explain why log records for transactions on the undo-list must be processed in reverse order while those log records for transactions on the redo-list are processed ...
Consider the following transactions with data items P and Q initialized to zero: T1 : read (P) ; read (Q) ; if P = 0 then Q : = Q + 1 ; write (Q). T2 : read (Q) ; read (P) if Q = 0 then ...
Check whether Schedule is serial, serializable, Conflict serializable S:R2(Z),R2(Y),W2(Y),R3(Y),R3(Z),R1(X),W1(X),W3(Y)W3(Z)R2(X)R1(Y)W1(Y)
Show that two-phase locking protocol ensures conflict serializability and that transactions can be serialized according to their lock points with suitable examples.