BuyFindarrow_forward

Database Systems: Design, Implemen...

12th Edition
Carlos Coronel + 1 other
Publisher: Cengage Learning
ISBN: 9781305627482

Solutions

Chapter
Section
BuyFindarrow_forward

Database Systems: Design, Implemen...

12th Edition
Carlos Coronel + 1 other
Publisher: Cengage Learning
ISBN: 9781305627482
Chapter 10, Problem 9P
Textbook Problem
18 views

Assuming that pessimistic locking is being used with the two-phase locking protocol, create a chronological list of the locking, unlocking, and data manipulation activities that would occur during the complete processing of the transaction described in Problem 6a.

Program Plan Intro

Pessimistic locking:

It is one of the locking methods in concurrency control. The lock exists in the transaction until the transaction gets committed or rolled back.

Two-phase locking protocol:

It defined the serializability of the transaction but not prevent deadlocks. The process of locking and unlocking can be done using two phases in this protocol. They are: Growing phase and shrinking phase.

Growing phase:

New lock can be occurred on the transaction without unlocking the data items. The data items are locked in this phase.

Shrinking phase:

This phase used to release all transaction but not provide new lock on the transaction.

Explanation of Solution

Chronological list:

The following chronological list demonstrate locking, unlocking, and data manipulation activities of transaction described in “Problem 6a” using pessimistic locking method with the two-phase locking protocol.

Time Action
1 Lock INVOICE
2 Lock LINE
3 Lock PRODUCT
4 Lock CUSTOMER
5 Insert row 10983 into INVOICE
6 Insert tow 10983, 1 into LINE
7 Update PRODUCT 11QER/31, P_QTYOH from 47 to 46
8 Update CUSTOMER 10010, CUS_BALANCE from 345...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 10 Solutions

Database Systems: Design, Implementation, & Management
Show all chapter solutions
add

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
What is a policy? How is it different from a law?

Principles of Information Security (MindTap Course List)

Define each of the following terms: a. data b. field c. record d. file

Database Systems: Design, Implementation, & Management

Describe the difference between an open- and a closed-loop operation.

Automotive Technology: A Systems Approach (MindTap Course List)

Identify at least ten products around your home that make use of plastics.

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

Describe three systems development tools and three development methods.

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)

While each program may use a different method of encrypting files, they all use the process of cryptography.

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

What is meant by a welder's duty cycle?

Welding: Principles and Applications (MindTap Course List)

Which Cisco command lists configured VLANs on a switch?

Network+ Guide to Networks (MindTap Course List)