Explain why this procedure allows phantoms.

The following procedure has been proposed for obtaining read locks.
Whenever an SQL statement reads a set of rows that satisfies some predicate in a
table, the system first gets an IS lock on the table containing the rows and then
gets an S lock on each of the rows.


An INSERT or DELETE statement gets a non-conflicting IX lock on the table and X
locks on the tuples inserted or modified. The inserted tuples might satisfy the predicate but since they are newthere would be no lock conflict to delay the insert. Similarly the initial value of a modified tuple might not satisfy the predicate and so it would be possible to obtain an X

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. In order to be classified as a "computer," a device must have a keyboard and display screen.
2. A bus is a collection of wires that carry information as electrical signals between the hardware components of a computer.
3. As computer programs can be complex and difficult to write, they are known as "hardware."
4. A bit is a unit of data that correspond to one of two potential values
(commonly written as 0 and 1).
5. A kilobyte of storage is where a byte is a collection of eight bits.

Computer Science & Information Technology

Field ________ are characteristics of a field that control how the field displays and how data is entered in the field

Fill in the blank(s) with correct word

Computer Science & Information Technology

Revisions and comments made by all reviewers display in blue

Indicate whether the statement is true or false

Computer Science & Information Technology

Describe the stores where Android apps are available for purchase and download.

What will be an ideal response?

Computer Science & Information Technology