We have given two different implementations of the READ COMMITTED isolation level: the locking implementation in Section 21.2 and the read-consistency implementation in Section 21.5. Give an example of a schedule in which the two implementations produce different results.

What will be an ideal response?


A SELECT statement using a non-insensitive cursor, followed by some FETCH
statements. In the Read Consistency version, all fetches are from the same snapshot
of the database. In the locking implementation, different fetches might come from
different snapshots.

Computer Science & Information Technology

You might also like to view...

The ____ determines which color model is being used to display and print the image on which you are working.

A. mode sheet B. model list C. color mode D. color swatch

Computer Science & Information Technology

You cannot apply a table style to an existing table

Indicate whether the statement is true or false

Computer Science & Information Technology

What is a scenario in Excel What-if analysis?

A. A two-variable goal seek tool B. Any what-if analysis C. A tool that changes one variable through several iterations D. Detailed set of values that represent different possible situations

Computer Science & Information Technology

Which of the following vulnerability types would the type of hacker known as a script kiddie be MOST dangerous against?

A. Passwords written on the bottom of a keyboard B. Unpatched exploitable Internet-facing services C. Unencrypted backup tapes D. Misplaced hardware token

Computer Science & Information Technology