Question: .1 Describe the Lost Update problem. Show an example. 1.2 What is/are solution(s) for lost update problems. 1.3 What is the problem when DBMS use
.1 Describe the Lost Update problem. Show an example.
1.2 What is/are solution(s) for lost update problems.
1.3 What is the problem when DBMS use lock approach? How to solve this problem
Question 2
2.1 What is the checkpoint? What is the role of checkpoint (why we need it)?
2.2 This is an exercise for your understanding to the process of database recovery.
Describe two phase locking and serializability (Why it is needed, what it is, how it works).
Question 4. Describe the ACID features/principles of a transaction. For each feature/principle, give an example that violates this feature. Namely, discuss a situation where a principle is violated and the corresponding problem(s). For example, what situation will cause a transaction not Atomic.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
