adplus-dvertising
frame-decoration

Question

The __________ requires that each transaction Ti executes in two or three different phases in its lifetime, depending on whether it is a read-only or an update transaction.

a.

Validation protocol

b.

Validation-based protocol

c.

Timestamp protocol

d.

Timestamp-ordering protocol

Posted under DBMS

Answer: (a).Validation protocol

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The __________ requires that each transaction Ti executes in two or three different phases in its lifetime, depending on whether it is a read-only or an update transaction.

Similar Questions

Discover Related MCQs

Q. This validation scheme is called the _________ scheme since transactions execute optimistically, assuming they will be able to finish execution and validate at the end.

Q. The most recent version of standard SQL prescribed by the American National Standards Institute is

Q. ANSI-standard SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value is null is

Q. A lock that prevents the use of any tables in the database from one transaction while another transaction is being processed is called a

Q. A condition that occurs when two transactions wait for each other to unlock data is known as a(n)

Q. Which of the following is not true about B+ trees?

Q. The extent of the database resource that is included with each lock is called the level of

Q. Snapshot isolation is a particular type of ______________ scheme.

Q. Snapshot isolation is used to give

Q. Lost update problem is

Q. Under first updater wins the system uses a __________ mechanism that applies only to updates.

Q. When a transaction Ti attempts to update a data item, it requests a _________ on that data item.

Q. Each of a pair of transactions has read data that is written by the other, but there is no data written by both transactions, is referred to as

Q. An application developer can guard against certain snapshot anomalies by appending a ______ clause to the SQL select query.

Q. Evaluate the CREATE TABLE statement:

CREATE TABLE products
(product_id NUMBER(6) CONSTRAINT prod_id_pk PRIMARY KEY, product_name VARCHAR2(15));

Which statement is true regarding the PROD_ID_PK constraint?

Q. Evaluate the following CREATE SEQUENCE statement:

CREATE SEQUENCE seq1
START WITH 100
INCREMENT BY 10
MAXVALUE 200
CYCLE
NOCACHE;

The sequence SEQ1 has generated numbers up to the maximum limit of 200. You issue the following SQL statement:

SELECT seq1.nextval FROM dual;

What is displayed by the SELECT statement?

Q. The method of access that uses key transformation is called as

Q. Why do we need concurrency control on B+ trees ?

Q. How many techniques are available to control concurrency on B+ trees?

Q. In crabbing protocol locking