ACID Explanation and Demonstration Paper

.docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

408

Subject

Computer Science

Date

May 1, 2024

Type

docx

Pages

5

Uploaded by vanevalleverdugo02 on coursehero.com

1 ACID Explanation and Demonstration Paper Vanessa Verdugo Grand Canyon University SYM-408 Brian Letort November 12 th , 2023
2 ACID Explanation and Demonstration Paper The ACID Test: Components and an Example ACID is an acronym that stands for atomicity, consistency, isolation, and durability. These types of properties allow and guarantee databases be processed in safe way. If a row in the system fails at any point of the process it will capture it and make sure the information is not lost and will guarantee the transaction made. For database recovery ACID is needed since it provides major principles. First, atomicity which means that the transaction was made at its fullest or the transaction was not made. Next, consistency means that the transaction that was made is not causing any constraints or its not violating with the process (Watts, 2020). Isolation comes right after which refers to the transaction not interfering with other transactions, making sure everything is aligned. Finally, durability, which means that even if transaction effects will be kept permanently even if the server crashes it will be properly stored (Watts, 2020). ACID should adhere to database transactions to ensure that the transaction does not become corrupt (Ian, 2023). To keep databases safe and free from any kind of alteration is key for a database administrator. Collateral Damage in Update Query Collateral damage happens when you update a query and certain fields damage other data in the process. A database management system is built with some of the most complex software ever written, this is why the issue should be diffused before it arouses. An update query is a database operation that changes values of the rows, it searches for rows that that need to be modified according to the instructions in the query. If there is any type of mistake in the query it will modify each row that was not supposed to be changed, this is an effect on the rows and this
3 is what collateral damage is essentially. For example, a table of customer orders and an update query is being done to change the status of the products code. If there is a mistake in the query it will have a change to the code regardless of whatever the code might be, this would be considered an unintended modification. Data inconsistency can be detrimental and can cause serious consequences, such as data loss, data integrity, and accuracy. Overall, there are multiple steps that can be taken to avoid collateral damage. A test review update should be done to the queries before executing them. Also, features such as transaction logs and backups to minimize the risk and impact of any modification that can be unintentionally done. Overall, the use of safeguards is essential to prevent collateral damage. Locking Prevents Dirty Reads The locking mechanism in a server is essential to a successful SQL Server transaction processing and it is well designed to allow SQL Server to work successfully (Dimitrijevic, 2017). Locks are in-memory structures that are 96 bytes in size, these protect and hash the resource. This mechanism is designed to ensure the integrity of the data in the database, at the same time it allows the SQL Server to pass the transaction ACID test (Dimitrijevic, 2017). SQL Server locking is very essential for the isolation requirement, and it serves to lock objects affected by a transaction that is being made, this will prevent other transactions from making any change in the data stored. Once the lock has been released by taking back changed to how they were initially, other transactions will be allowed to make required data changes. There are various types of lock modes for example exclusive (X), shared (S), update (U), intent (I), schema (Sch), bulk update (BU). There are also conversion locks, regular intent locks, and locking hierarchy. The locking hierarchy is applied when a change of data is performed, it starts with the database then down to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help