Explain why constraint checking is usually deferred in transaction processing applications.

What will be an ideal response?


Because in many transactions, the intermediate database states violate the integrity constraints
but the nal states do not

Computer Science & Information Technology

You might also like to view...

By selecting the Scenario Summary option, you can create a worksheet that includes subtotals and the results of the scenarios

Indicate whether the statement is true or false.

Computer Science & Information Technology

A waiting thread transitions back to the ________ state only when another thread notifies it to continue executing.

a. runnable b. terminated c. new d. blocked

Computer Science & Information Technology

Ring _______ is the most trusted layer and is where the operating system kernel works and can interact directly with hardware.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Case WIN 1-2Danny needs to move and resize some of the windows he has open on the screen.To move a window, where should Danny click before dragging the window to a new location?

A. The title bar B. Outside the window C. Inside the window D. The scroll bar

Computer Science & Information Technology