0% found this document useful (0 votes)
51 views1 page

Database HW4

This document contains homework questions for a Managing Database course. Part 1 includes 3 questions about conflict serializability, cascade-less and recoverable schedules, and how strict two-phase locking can lead to deadlock. Part 2 includes questions comparing commit and rollback vs immediate and deferred update, listing constraints and procedures to prevent fraud, and justifying why undo is backward and redo is forward.

Uploaded by

Kamal Cheema
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views1 page

Database HW4

This document contains homework questions for a Managing Database course. Part 1 includes 3 questions about conflict serializability, cascade-less and recoverable schedules, and how strict two-phase locking can lead to deadlock. Part 2 includes questions comparing commit and rollback vs immediate and deferred update, listing constraints and procedures to prevent fraud, and justifying why undo is backward and redo is forward.

Uploaded by

Kamal Cheema
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

HOMEWORK -4

COURSE CODE: CSE200

COURSE NAME: Managing Database

PART-1

Q1.Explain the concept of Conflict Serializibility. Define Conflicting Instructions and


Non-Conflicting Instructions.

Q2.Define a Cascade-less schedule and a Recoverable Schedule. If a schedule is not


Cascade-less, does it mean “no recovery is feasible”? Justify your answer.

Q3.Using a suitable example justify how strict two phase locking can lead to deadlock?

PART-2

Q4.Compare and Contrast the following:

(i) Commit and Roll-Back

(ii) Immediate Update and Deferred Update

Q5.Consider a case of Computer related fraud you are familiar with. List the security
and Integrity constraints should have been implemented.Could audit and Control
Procedure have prevented the fraud?

Q6.Using an example Justify why the Undo Pass of recovery procedure is Performed in
the backward direction and Redo Pass is performed in the forward direction?

You might also like