Explain the difference in semantics between the two versions of chaining discussed in the text.

What will be an ideal response?


In the first version, locks are given up after each chained transaction commits. In the
second version, locks are retained. Therefore, in the first version each subtransaction
in the chain might see a different database state than the one that existed when the
subtransaction before it committed.

Computer Science & Information Technology

You might also like to view...

Member functions defined as private in the base class (are/are not) inherited in the derived class

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Because GUI programs must respond to the actions of the user, they are said to be ____________.

a. response-based b. drag-and-drop c. open-ended d. event-driven

Computer Science & Information Technology

Why did demand fetching endure as the conventional wisdom for so long? Why are anticipatory fetch strategies receiving so much more attention today than they did decades ago?

What will be an ideal response?

Computer Science & Information Technology

Text typed in a shape is ________ within the shape

A) centered horizontally and vertically B) justified C) left aligned D) right aligned

Computer Science & Information Technology