SlideShare a Scribd company logo
1 of 1
Download to read offline
What is the purpose of database administration?
2. What is the purpose of concurrency control?
3. Give an different example of the lost update problem in Lecture slide (Chapter 6-15)
4. Explain two-phase locking.
5. Explain the meaning of the expression of ACID transaction.
Solution
1. What is the purpose of database administration?
Data administration is the concept of managing people and their rights on how to access the data
and to which level of granularity is the different people/designations are allowed to access the
data base. Its just authorizing and de-authorizing people on how to access the data.
2. Purpose of concurrency control?
Concurrency control is allowing more than one transaction to access the object in a safe and
secure way such that the database is consistent at the end of multiple transactions. If concurrency
control not applied properly, either the transactions should be performed serially, or the
concurrent transactions may make the database inconsistent.
3. Give an different example of the lost update problem in Lecture slide (Chapter 6-15)
Lost update is the concept of one update done by a transaction is lost, just because the data is
read by other transaction before the update, and is written after the update.
Consider a scenario:
T1: Read A (Assume A = 50)
T2: Read A (Assume A = 50)
T2: Update A (Assume A is increased by 10)
T2: Write A (Now A = 60)
T1: Update A (Assume A is decreased by 10 )
T1: Write A (Now A = 40)
Here the update done by Transaction T2 is lost.

More Related Content

Similar to What is the purpose of database administration2. What is the purp.pdf

An Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemAn Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemIJSRD
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Database systems assignment 1
Database systems   assignment 1Database systems   assignment 1
Database systems assignment 1Nelson Kimathi
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controlsFITSFSd
 
DBMS-chap 2-Concurrency Control
DBMS-chap 2-Concurrency ControlDBMS-chap 2-Concurrency Control
DBMS-chap 2-Concurrency ControlMukesh Tekwani
 
Security and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity ConstantSecurity and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity ConstantPrakash Kumar
 
DBF-Lecture11-Chapter12.pptDatabase Principles Fundam.docx
DBF-Lecture11-Chapter12.pptDatabase Principles Fundam.docxDBF-Lecture11-Chapter12.pptDatabase Principles Fundam.docx
DBF-Lecture11-Chapter12.pptDatabase Principles Fundam.docxrandyburney60861
 
Sensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSSensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSKAMLESH HINGWE
 
Intro to database systems homework questions- 1- List the ACID propert.docx
Intro to database systems homework questions- 1- List the ACID propert.docxIntro to database systems homework questions- 1- List the ACID propert.docx
Intro to database systems homework questions- 1- List the ACID propert.docxolsenlinnea427
 
A Review Report on Security Threats on Database
A Review Report on Security Threats on DatabaseA Review Report on Security Threats on Database
A Review Report on Security Threats on DatabaseShivnandan Singh
 
Advanced Database Management Syatem
Advanced Database Management SyatemAdvanced Database Management Syatem
Advanced Database Management Syatemchirag patil
 
Using Lattice To Dynamically Prevent Information Leakage For Web Services
Using Lattice To Dynamically Prevent Information Leakage For Web ServicesUsing Lattice To Dynamically Prevent Information Leakage For Web Services
Using Lattice To Dynamically Prevent Information Leakage For Web ServicesClaraZara1
 
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICESUSING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICESijsptm
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Editor IJARCET
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security FrameworkMaria Perkins
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKijcsit
 
Session 9 Tp9
Session 9 Tp9Session 9 Tp9
Session 9 Tp9phanleson
 

Similar to What is the purpose of database administration2. What is the purp.pdf (20)

An Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemAn Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management System
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Database systems assignment 1
Database systems   assignment 1Database systems   assignment 1
Database systems assignment 1
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
 
DBMS-chap 2-Concurrency Control
DBMS-chap 2-Concurrency ControlDBMS-chap 2-Concurrency Control
DBMS-chap 2-Concurrency Control
 
Security and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity ConstantSecurity and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity Constant
 
Computer Science Homework Help
Computer Science Homework HelpComputer Science Homework Help
Computer Science Homework Help
 
DBF-Lecture11-Chapter12.pptDatabase Principles Fundam.docx
DBF-Lecture11-Chapter12.pptDatabase Principles Fundam.docxDBF-Lecture11-Chapter12.pptDatabase Principles Fundam.docx
DBF-Lecture11-Chapter12.pptDatabase Principles Fundam.docx
 
Tps
TpsTps
Tps
 
Sensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSSensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaS
 
Intro to database systems homework questions- 1- List the ACID propert.docx
Intro to database systems homework questions- 1- List the ACID propert.docxIntro to database systems homework questions- 1- List the ACID propert.docx
Intro to database systems homework questions- 1- List the ACID propert.docx
 
A Review Report on Security Threats on Database
A Review Report on Security Threats on DatabaseA Review Report on Security Threats on Database
A Review Report on Security Threats on Database
 
Advanced Database Management Syatem
Advanced Database Management SyatemAdvanced Database Management Syatem
Advanced Database Management Syatem
 
Using Lattice To Dynamically Prevent Information Leakage For Web Services
Using Lattice To Dynamically Prevent Information Leakage For Web ServicesUsing Lattice To Dynamically Prevent Information Leakage For Web Services
Using Lattice To Dynamically Prevent Information Leakage For Web Services
 
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICESUSING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
Session 9 Tp9
Session 9 Tp9Session 9 Tp9
Session 9 Tp9
 
Job Opportunity
Job OpportunityJob Opportunity
Job Opportunity
 

More from bermanbeancolungak45

Write a program that randomly generates a maze in javaSolution.pdf
Write a program that randomly generates a maze in javaSolution.pdfWrite a program that randomly generates a maze in javaSolution.pdf
Write a program that randomly generates a maze in javaSolution.pdfbermanbeancolungak45
 
why is the idea of a standard network protocol such as the OSI refer.pdf
why is the idea of a standard network protocol such as the OSI refer.pdfwhy is the idea of a standard network protocol such as the OSI refer.pdf
why is the idea of a standard network protocol such as the OSI refer.pdfbermanbeancolungak45
 
Which of the following potential problems need not be considered whe.pdf
Which of the following potential problems need not be considered whe.pdfWhich of the following potential problems need not be considered whe.pdf
Which of the following potential problems need not be considered whe.pdfbermanbeancolungak45
 
Which of the following is true of mutations They are very common T.pdf
Which of the following is true of mutations  They are very common  T.pdfWhich of the following is true of mutations  They are very common  T.pdf
Which of the following is true of mutations They are very common T.pdfbermanbeancolungak45
 
What type of security vulnerability are developers most likely to in.pdf
What type of security vulnerability are developers most likely to in.pdfWhat type of security vulnerability are developers most likely to in.pdf
What type of security vulnerability are developers most likely to in.pdfbermanbeancolungak45
 
what is code to draw sun and earth and the moon in java OpenGLS.pdf
what is code to draw sun and earth and the moon in java OpenGLS.pdfwhat is code to draw sun and earth and the moon in java OpenGLS.pdf
what is code to draw sun and earth and the moon in java OpenGLS.pdfbermanbeancolungak45
 
What factors do you think make them excellent project reports write.pdf
What factors do you think make them excellent project reports write.pdfWhat factors do you think make them excellent project reports write.pdf
What factors do you think make them excellent project reports write.pdfbermanbeancolungak45
 
What aspects of todays information economy have influenced the imp.pdf
What aspects of todays information economy have influenced the imp.pdfWhat aspects of todays information economy have influenced the imp.pdf
What aspects of todays information economy have influenced the imp.pdfbermanbeancolungak45
 
This week, we are going to work together as a class to assist the Lon.pdf
This week, we are going to work together as a class to assist the Lon.pdfThis week, we are going to work together as a class to assist the Lon.pdf
This week, we are going to work together as a class to assist the Lon.pdfbermanbeancolungak45
 
The phylogenetic species concept looks at environmental adaptations a.pdf
The phylogenetic species concept looks at environmental adaptations a.pdfThe phylogenetic species concept looks at environmental adaptations a.pdf
The phylogenetic species concept looks at environmental adaptations a.pdfbermanbeancolungak45
 
The percentage of high school students who drink and drive was 17.5.pdf
The percentage of high school students who drink and drive was 17.5.pdfThe percentage of high school students who drink and drive was 17.5.pdf
The percentage of high school students who drink and drive was 17.5.pdfbermanbeancolungak45
 
Take a position on this statement The media represent realistic ima.pdf
Take a position on this statement The media represent realistic ima.pdfTake a position on this statement The media represent realistic ima.pdf
Take a position on this statement The media represent realistic ima.pdfbermanbeancolungak45
 
Suppose 60 different survey organizations visit eastern Tennessee to.pdf
Suppose 60 different survey organizations visit eastern Tennessee to.pdfSuppose 60 different survey organizations visit eastern Tennessee to.pdf
Suppose 60 different survey organizations visit eastern Tennessee to.pdfbermanbeancolungak45
 
Relate selected early morphological developments in the ancestors of.pdf
Relate selected early morphological developments in the ancestors of.pdfRelate selected early morphological developments in the ancestors of.pdf
Relate selected early morphological developments in the ancestors of.pdfbermanbeancolungak45
 
Question VI. In 1976, Hozumi and Tonegawa published an elegant paper.pdf
Question VI. In 1976, Hozumi and Tonegawa published an elegant paper.pdfQuestion VI. In 1976, Hozumi and Tonegawa published an elegant paper.pdf
Question VI. In 1976, Hozumi and Tonegawa published an elegant paper.pdfbermanbeancolungak45
 
question - Jurassic Park (book and movie) proposed the concept of.pdf
question - Jurassic Park (book and movie) proposed the concept of.pdfquestion - Jurassic Park (book and movie) proposed the concept of.pdf
question - Jurassic Park (book and movie) proposed the concept of.pdfbermanbeancolungak45
 
Python programming question Assume that a file containing a serie.pdf
Python programming question Assume that a file containing a serie.pdfPython programming question Assume that a file containing a serie.pdf
Python programming question Assume that a file containing a serie.pdfbermanbeancolungak45
 
Prior to the development of anti-retroviral drugs, HIV infected pati.pdf
Prior to the development of anti-retroviral drugs, HIV infected pati.pdfPrior to the development of anti-retroviral drugs, HIV infected pati.pdf
Prior to the development of anti-retroviral drugs, HIV infected pati.pdfbermanbeancolungak45
 
Please this is my second time posting. I really need the right answe.pdf
Please this is my second time posting. I really need the right answe.pdfPlease this is my second time posting. I really need the right answe.pdf
Please this is my second time posting. I really need the right answe.pdfbermanbeancolungak45
 
Please by using Computer!Each of you were assigned a count.pdf
Please by using Computer!Each of you were assigned a count.pdfPlease by using Computer!Each of you were assigned a count.pdf
Please by using Computer!Each of you were assigned a count.pdfbermanbeancolungak45
 

More from bermanbeancolungak45 (20)

Write a program that randomly generates a maze in javaSolution.pdf
Write a program that randomly generates a maze in javaSolution.pdfWrite a program that randomly generates a maze in javaSolution.pdf
Write a program that randomly generates a maze in javaSolution.pdf
 
why is the idea of a standard network protocol such as the OSI refer.pdf
why is the idea of a standard network protocol such as the OSI refer.pdfwhy is the idea of a standard network protocol such as the OSI refer.pdf
why is the idea of a standard network protocol such as the OSI refer.pdf
 
Which of the following potential problems need not be considered whe.pdf
Which of the following potential problems need not be considered whe.pdfWhich of the following potential problems need not be considered whe.pdf
Which of the following potential problems need not be considered whe.pdf
 
Which of the following is true of mutations They are very common T.pdf
Which of the following is true of mutations  They are very common  T.pdfWhich of the following is true of mutations  They are very common  T.pdf
Which of the following is true of mutations They are very common T.pdf
 
What type of security vulnerability are developers most likely to in.pdf
What type of security vulnerability are developers most likely to in.pdfWhat type of security vulnerability are developers most likely to in.pdf
What type of security vulnerability are developers most likely to in.pdf
 
what is code to draw sun and earth and the moon in java OpenGLS.pdf
what is code to draw sun and earth and the moon in java OpenGLS.pdfwhat is code to draw sun and earth and the moon in java OpenGLS.pdf
what is code to draw sun and earth and the moon in java OpenGLS.pdf
 
What factors do you think make them excellent project reports write.pdf
What factors do you think make them excellent project reports write.pdfWhat factors do you think make them excellent project reports write.pdf
What factors do you think make them excellent project reports write.pdf
 
What aspects of todays information economy have influenced the imp.pdf
What aspects of todays information economy have influenced the imp.pdfWhat aspects of todays information economy have influenced the imp.pdf
What aspects of todays information economy have influenced the imp.pdf
 
This week, we are going to work together as a class to assist the Lon.pdf
This week, we are going to work together as a class to assist the Lon.pdfThis week, we are going to work together as a class to assist the Lon.pdf
This week, we are going to work together as a class to assist the Lon.pdf
 
The phylogenetic species concept looks at environmental adaptations a.pdf
The phylogenetic species concept looks at environmental adaptations a.pdfThe phylogenetic species concept looks at environmental adaptations a.pdf
The phylogenetic species concept looks at environmental adaptations a.pdf
 
The percentage of high school students who drink and drive was 17.5.pdf
The percentage of high school students who drink and drive was 17.5.pdfThe percentage of high school students who drink and drive was 17.5.pdf
The percentage of high school students who drink and drive was 17.5.pdf
 
Take a position on this statement The media represent realistic ima.pdf
Take a position on this statement The media represent realistic ima.pdfTake a position on this statement The media represent realistic ima.pdf
Take a position on this statement The media represent realistic ima.pdf
 
Suppose 60 different survey organizations visit eastern Tennessee to.pdf
Suppose 60 different survey organizations visit eastern Tennessee to.pdfSuppose 60 different survey organizations visit eastern Tennessee to.pdf
Suppose 60 different survey organizations visit eastern Tennessee to.pdf
 
Relate selected early morphological developments in the ancestors of.pdf
Relate selected early morphological developments in the ancestors of.pdfRelate selected early morphological developments in the ancestors of.pdf
Relate selected early morphological developments in the ancestors of.pdf
 
Question VI. In 1976, Hozumi and Tonegawa published an elegant paper.pdf
Question VI. In 1976, Hozumi and Tonegawa published an elegant paper.pdfQuestion VI. In 1976, Hozumi and Tonegawa published an elegant paper.pdf
Question VI. In 1976, Hozumi and Tonegawa published an elegant paper.pdf
 
question - Jurassic Park (book and movie) proposed the concept of.pdf
question - Jurassic Park (book and movie) proposed the concept of.pdfquestion - Jurassic Park (book and movie) proposed the concept of.pdf
question - Jurassic Park (book and movie) proposed the concept of.pdf
 
Python programming question Assume that a file containing a serie.pdf
Python programming question Assume that a file containing a serie.pdfPython programming question Assume that a file containing a serie.pdf
Python programming question Assume that a file containing a serie.pdf
 
Prior to the development of anti-retroviral drugs, HIV infected pati.pdf
Prior to the development of anti-retroviral drugs, HIV infected pati.pdfPrior to the development of anti-retroviral drugs, HIV infected pati.pdf
Prior to the development of anti-retroviral drugs, HIV infected pati.pdf
 
Please this is my second time posting. I really need the right answe.pdf
Please this is my second time posting. I really need the right answe.pdfPlease this is my second time posting. I really need the right answe.pdf
Please this is my second time posting. I really need the right answe.pdf
 
Please by using Computer!Each of you were assigned a count.pdf
Please by using Computer!Each of you were assigned a count.pdfPlease by using Computer!Each of you were assigned a count.pdf
Please by using Computer!Each of you were assigned a count.pdf
 

Recently uploaded

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

What is the purpose of database administration2. What is the purp.pdf

  • 1. What is the purpose of database administration? 2. What is the purpose of concurrency control? 3. Give an different example of the lost update problem in Lecture slide (Chapter 6-15) 4. Explain two-phase locking. 5. Explain the meaning of the expression of ACID transaction. Solution 1. What is the purpose of database administration? Data administration is the concept of managing people and their rights on how to access the data and to which level of granularity is the different people/designations are allowed to access the data base. Its just authorizing and de-authorizing people on how to access the data. 2. Purpose of concurrency control? Concurrency control is allowing more than one transaction to access the object in a safe and secure way such that the database is consistent at the end of multiple transactions. If concurrency control not applied properly, either the transactions should be performed serially, or the concurrent transactions may make the database inconsistent. 3. Give an different example of the lost update problem in Lecture slide (Chapter 6-15) Lost update is the concept of one update done by a transaction is lost, just because the data is read by other transaction before the update, and is written after the update. Consider a scenario: T1: Read A (Assume A = 50) T2: Read A (Assume A = 50) T2: Update A (Assume A is increased by 10) T2: Write A (Now A = 60) T1: Update A (Assume A is decreased by 10 ) T1: Write A (Now A = 40) Here the update done by Transaction T2 is lost.