BuyFindarrow_forward

Database Systems: Design, Implemen...

12th Edition
Carlos Coronel + 1 other
Publisher: Cengage Learning
ISBN: 9781305627482

Solutions

Chapter
Section
BuyFindarrow_forward

Database Systems: Design, Implemen...

12th Edition
Carlos Coronel + 1 other
Publisher: Cengage Learning
ISBN: 9781305627482
Chapter 10, Problem 10P
Textbook Problem
1 views

Assuming that pessimistic locking is being used but the two-phase locking protocol is not, create a chronological list of the locking, unlocking, and data manipulation activities that would occur during the complete processing of the transaction described in Problem 6b.

Program Plan Intro

Pessimistic locking:

It is one of the locking methods in concurrency control. The lock exists in the transaction until the transaction gets committed or rolled back.

Two-phase locking protocol:

It defined the serializability of the transaction but not prevent deadlocks. The process of locking and unlocking can be done using two phases in this protocol. They are: Growing phase and shrinking phase.

Growing phase:

New lock can be occurred on the transaction without unlocking the data items. The data items are locked in this phase.

Shrinking phase:

This phase used to release all transaction but not provide new lock on the transaction.

Explanation of Solution

Chronological list:

The following chronological list demonstrates locking, unlocking, and data manipulation activities of transaction described in “Problem 6b” using pessimistic locking method without two-phase locking.

Time Action
1 Lock PAYMENT
2 Insert row 3428 into PAYMENT
3 Unlock PAYMENT
4 Lock CUSTOMER
5 Update CUSTOMER 10010, CUS_BALANCE from 464...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 10 Solutions

Database Systems: Design, Implementation, & Management
Show all chapter solutions
add

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change?

Principles of Information Security (MindTap Course List)

A __________ is used to retain the toolholder in the milling machine spindle.

Precision Machining Technology (MindTap Course List)

For Problem 19.22, determine the probability (assuming normal distribution) that a light bulb would have a life...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

Describe the strategy of mitigation.

Management Of Information Security

Determine the magnitudes of the roller reactions at C and D. Neglect the weights of the members.

International Edition---engineering Mechanics: Statics, 4th Edition

A group of two or more integrated hard drives is called a(n)_____. (380) a. RAID b. SSD c. HDD d. EIDE

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)