Latest Questions & Answers

Q: Write the SQL code to calculate the ASSIGN_CHARGE values in

Write the SQL code to calculate the ASSIGN_CHARGE values in the ASSIGNMENT table in the Ch07_ConstructCo database. (See Figure P7.1.) Note that ASSIGN_CHARGE is a derived attribute that is calculated...

See Answer

Q: Assuming that pessimistic locking is being used, but the two-

Assuming that pessimistic locking is being used, but the two-phase locking protocol is not, create a chronological list of the locking, unlocking, and data manipulation activities that would occur dur...

See Answer

Q: Create a simple transaction log (using the format shown in Table

Create a simple transaction log (using the format shown in Table 10.13) to represent the actions of the two previous transactions.

See Answer

Q: ABC Markets sell products to customers. The relational diagram shown in

ABC Markets sell products to customers. The relational diagram shown in Figure P10.6 represents the main entities for ABC’s database. Note the following important characteristics: &a...

See Answer

Q: Suppose that your database system has failed. Describe the database recovery

Suppose that your database system has failed. Describe the database recovery process and the use of deferred-write and write-through techniques.

See Answer

Q: Using a simple example, explain the use of binary and shared

Using a simple example, explain the use of binary and shared/exclusive locks in a DBMS.

See Answer

Q: What DBMS component is responsible for concurrency control? How is this

What DBMS component is responsible for concurrency control? How is this feature used to resolve conflicts?

See Answer

Q: Describe the three most common problems with concurrent transaction execution. Explain

Describe the three most common problems with concurrent transaction execution. Explain how concurrency control can be used to avoid those problems.

See Answer

Q: Assuming that pessimistic locking with the two-phase locking protocol is

Assuming that pessimistic locking with the two-phase locking protocol is being used, create a chronological list of the locking, unlocking, and data manipulation activities that would occur during the...

See Answer

Q: Assuming that pessimistic locking is being used, but the two-

Assuming that pessimistic locking is being used, but the two-phase locking protocol is not, create a chronological list of the locking, unlocking, and data manipulation activities that would occur dur...

See Answer