The schema of the Student Registration System includes the number of current registrants and a list of registered students in each course.
a. What integrity constraint relates this data?
b. Howmight a registration transaction that is not atomic violate this constraint?
c. Suppose the system also implements a transaction that displays the current
information about a course. Give a nonisolated schedule in which the transaction
displays inconsistent information.
a. The number of students on the list equals the number of current registrants
b. It might increment the number but crash before it appends to the list, and the
increment might not be rolled back
c. The display transaction takes a snapshot between the increment and the append
You might also like to view...
What should you do to prevent blockage of the port used to communicate with a SQL Server instance?
A. disable the firewall on the client B. configure a fixed port C. disable the firewall on the server D. use named pipes
Retinal scanning is an example of ________ authentication
Fill in the blank(s) with correct word
Match each item with a statement below.
A. notification of events or errors on the network B. an IPv6 multicast method that permits multiple recipients to be designated for a single message C. a point in time at which all system state and information is captured and saved D. manages point-to-point transmission across the networking medium, from one computer to another on a single logical or physical cable segment E. Data Link layer PDU F. the PDU associated with the Network layer G. undersized packet H. PDU at the TCP/IP Network Access Layer I. device that operate on the Internet
The ____ tool mode on the Shape options bar adds a bitmap shape that overwrites underlying pixels.
a. Overwrites b. Add a bitmap shape c. Fill pixels d. Pixels