Computer Science: An Overview (13th Edition) (What's New in Computer Science)
13th Edition
ISBN: 9780134875460
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 9.4, Problem 3QE
Program Plan Intro
Interweaving of transactions:
If two or more transactions are processed from the same account in small interval of time, it is known as interweaving of transactions.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Consider the following two transactions:
T1-R(B), W(B), R(C), R(A)
T2-R(B). W(B)
Say that sharing lock, exclusive lock, and unlock actions are inserted by the scheduler, resulting in the following annotated transactions:
T1= X(B), R(B), W(B), S(C), R(C), S(A), U(B), R(A), U(C), U(A)
T2-X(B), R(B), W(B), U(B)
Cascading rollback is not possible for the above schedule.
True
False
Consider the following two transactions:
T1 = R(A). W(A), R(B), R(C)
T2 - W(C). R(B), R(A). W(B)
Say that sharing lock, exclusive lock, and unlock actions are inserted by the scheduler, resulting in the following annotated transactions:
T1 - X(A), R(A), W(A), S(B), R(B), S(C), U(A), R(C), U(B), S(C)
T2 - X(C), W(C), X(B), S(A), U(C), R(B), R(A), U(A), W(B), U(B)
The above schedule follows 2 PL so conflict serializability is guaranteed.
O True
O False
Computer Science
A blockchain could be considered as a state machine. Suppose a hospial with 100,000 patients, 500 physicians, 1000 nurses, and 100 adminsitrative staff is using a blockchain to keep track of its activities. Each patient has a patient ID. Each of the employees (physicians, nurses, and admins) have an employee ID. For simplicity let us assume that there are only five types of transactions: (i) New patient admitted and assignd an ID by an admin (ii) A patient is discharged by an admin (iii) A nurse takes a triage of the patient (temperature, blood pressure, etc.) and records the information(iv) A physician makes a diagnosis and prescribes medications (v) Patient is billed by an admin. Answer the following questions.
What could be the state of the hospital?
What would a transaction of type (iv) look like? (Hint: Show the type and its parameters)
If a patient with ID A67567 has been discharged (type ii), show how this transaction results in a transition to a new state?…
Chapter 9 Solutions
Computer Science: An Overview (13th Edition) (What's New in Computer Science)
Ch. 9.1 - Identify two departments in a manufacturing plant...Ch. 9.1 - Prob. 2QECh. 9.1 - Summarize the roles of the application software...Ch. 9.2 - Prob. 1QECh. 9.2 - Prob. 2QECh. 9.2 - Prob. 4QECh. 9.2 - Prob. 5QECh. 9.2 - Prob. 6QECh. 9.3 - Prob. 1QECh. 9.3 - What is a persistent object?
Ch. 9.3 - Identify some classes as well as some of their...Ch. 9.3 - Prob. 4QECh. 9.4 - Prob. 1QECh. 9.4 - Prob. 2QECh. 9.4 - Prob. 3QECh. 9.4 - Prob. 4QECh. 9.4 - Prob. 5QECh. 9.4 - Prob. 6QECh. 9.5 - Prob. 1QECh. 9.5 - Prob. 2QECh. 9.5 - Prob. 3QECh. 9.5 - Prob. 4QECh. 9.5 - Prob. 5QECh. 9.5 - Prob. 6QECh. 9.5 - Prob. 7QECh. 9.6 - Prob. 1QECh. 9.6 - Give an additional example of a pattern that might...Ch. 9.6 - Prob. 3QECh. 9.6 - How does data mining differ from traditional...Ch. 9.7 - Prob. 1QECh. 9.7 - Prob. 2QECh. 9.7 - Prob. 3QECh. 9.7 - Prob. 4QECh. 9 - Prob. 1CRPCh. 9 - Prob. 2CRPCh. 9 - Prob. 3CRPCh. 9 - Prob. 4CRPCh. 9 - Prob. 5CRPCh. 9 - Prob. 6CRPCh. 9 - Prob. 7CRPCh. 9 - Prob. 8CRPCh. 9 - Prob. 9CRPCh. 9 - Prob. 10CRPCh. 9 - Prob. 11CRPCh. 9 - Prob. 12CRPCh. 9 - Using the commands SELECT, PROJECT, and JOIN,...Ch. 9 - Answer Problem 13 using SQL. PROBLEM 13 13. Using...Ch. 9 - Prob. 15CRPCh. 9 - Prob. 16CRPCh. 9 - Prob. 17CRPCh. 9 - Prob. 18CRPCh. 9 - Prob. 19CRPCh. 9 - Empl Id Name Address SSN Job Id Job Title Skill...Ch. 9 - Empl Id Name Address SSN Job Id Job Title Skill...Ch. 9 - Prob. 22CRPCh. 9 - Prob. 23CRPCh. 9 - Prob. 24CRPCh. 9 - Prob. 25CRPCh. 9 - Write a sequence of instructions (using the...Ch. 9 - Prob. 27CRPCh. 9 - Prob. 28CRPCh. 9 - Prob. 29CRPCh. 9 - Prob. 30CRPCh. 9 - Prob. 31CRPCh. 9 - Prob. 32CRPCh. 9 - Prob. 33CRPCh. 9 - Prob. 34CRPCh. 9 - Prob. 35CRPCh. 9 - Prob. 36CRPCh. 9 - Prob. 37CRPCh. 9 - Prob. 38CRPCh. 9 - Prob. 39CRPCh. 9 - Prob. 40CRPCh. 9 - Prob. 41CRPCh. 9 - Prob. 42CRPCh. 9 - Prob. 43CRPCh. 9 - Prob. 44CRPCh. 9 - Prob. 45CRPCh. 9 - Prob. 46CRPCh. 9 - Prob. 47CRPCh. 9 - Prob. 48CRPCh. 9 - Prob. 49CRPCh. 9 - Prob. 50CRPCh. 9 - Prob. 51CRPCh. 9 - Prob. 52CRPCh. 9 - Prob. 53CRPCh. 9 - Prob. 54CRPCh. 9 - Prob. 55CRPCh. 9 - Prob. 56CRPCh. 9 - Prob. 57CRPCh. 9 - Prob. 58CRPCh. 9 - Prob. 59CRPCh. 9 - Prob. 60CRPCh. 9 - Prob. 61CRPCh. 9 - Prob. 62CRPCh. 9 - Prob. 1SICh. 9 - Prob. 2SICh. 9 - Prob. 3SICh. 9 - Prob. 4SICh. 9 - Prob. 5SICh. 9 - Prob. 6SICh. 9 - Prob. 7SICh. 9 - Prob. 8SICh. 9 - Prob. 9SICh. 9 - Prob. 10SI
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- In a POS system, a transaction is based on items purchased by the customer. The following is an example of a customer transaction receipt, where the prices shown in the receipt are GST inclusive.arrow_forwardSuppose half of all the transactions in a clothes shop purchase jeans, and onethird of all transactions in the shop purchase T-shirts. Suppose also that half of the transactions that purchase jeans also purchase T-shirts. Write down all the (nontrivial) association rules you can deduce from the above information, giving support and confidence of each rule.arrow_forwardSuppose a system runs three types of transactions. Transactions of type A runat the rate of 50 per second, transactions of type B run at 100 per second, andtransactions of type C run at 200 per second. Suppose the mix of transactionshas 25 percent of type A, 25 percent of type B, and 50 percent of type C. a. What is the average transaction throughput of the system, assuming there is no interference between the transactions? b. What factors may result in interference between the transactions of different types, leading to the calculated throughput being incorrect?arrow_forward
- In a list there is cost price of n goods. On the most expensive thing there is a loss of x% and on the cheapest thing there is a gain of y% and on rest of things there is a gain of p%. Find loss or gain on whole transaction in Rupees.arrow_forwardQ3: Define the Conflict Serializability, then consider three transactions T1, T2, and T3, and two schedules S1 and S2 given below such that: S1: R1(X), R3(K), R2(Y), R1(Y), R3(X), R3(Z), W1(X), W3(Z), R2(Z), W2(Y), W2(Z), W3(K). S2: R1(Y), R3(Z), R1(X), R2(K), W2(X), W1(X), W2(Y), W3(Y), W2(K), W1(Y), W3(Y), W3(Z). Test whether they are Conflict Serializability or not? note /Solve the question in two waysarrow_forwardQ3: Define the Conflict Serializability, then consider three transactions T1, T2, and T3, and two schedules S1 and S2 given below such that: S1: R1(X), R3(K), R2(Y), R1(Y), R3(X), R3(Z), W1(X), W3(Z), R2(Z), W2(Y), W2(Z), W3(K). S2: R1(Y), R3(Z), R1(X), R2(K), W2(X), W1(X), W2(Y), W3(Y), W2(K), W1(Y), W3(Y), W3(Z). Test whether they are Conflict Serializability or not?arrow_forward
- Damon Davis was creating the Drano Plumbing Company's spreadsheet. He determined that the net income would be $50,000. When he tallied the columns on the Balance Sheet, the totals were as follows: debit, $400,000; and credit, $300,000. What was the most likely reason for this discrepancy? If this was not the case, how should he proceed to determine the source of the error?arrow_forwardBuild a decision table and simplify the same. Customer can withdraw money from ATM. ATM machine pays out the amount if the customer enters correct pin and it customer has sufficient funds in their account or if the customer has the credit granted. ATM should also have enough funds to dispense the cash as per the customer request.arrow_forwardHer public key certificate is valid from 1000 hours on the 9th November 2013 to 1000 hours on the 9th November 2014, according to Alice's certificate. As of the 15th of March 2014, the certificate was cancelled. This list is published every day at midnight by the CA. Dates are determined by the following:As soon as Alice's certificate arrives in the CRL and as soon as it departs from the CRL, respectivelyPlease describe the solution in detail.arrow_forward
- Alice and Bob now decide to use Diffie-Hellman Key Exchange (DHKE) (p. 343) with certificates. Both Alice and Bob agree on p=23 and α=5. Alice chooses a=7 and Bob chooses b=13. Answer the following. What is the public key generated by Alice? What is the public key generated by Bob? What is the computed shared key by Alice? What is the computed shared key by Bob?arrow_forwardc) Consider a scenario where a fraudulent dealer sends an electronic message to a stock agent, asking him to buy $5,000 worth of shares in CryptoBitCoin. The following day the value of CryptoBitCoin shares rises significantly. The dealer now acts that his original message was asking to purchase $50,000 worth of shares. On the contrary, if the share price drop, the dealer might act that the original message asked to buy shares in KryptoBitCoin instead. Based on this scenario, would you consider the dealer's action a breach of any information security goal(s)? If your answer is no, clearly explain the reasoning behind your answer. If your answer is yes, identify the breached security goal(s) with necessary explanation of your answer, and recommend suitable primitive(s) that can be used to address the corresponding security goal(s).arrow_forwardConsider the transaction database represented by the matrix D: I1 I2 I3 I4 I5 I6 T1 1 1 T2 T3 1 1 T4 1 1 1 1 1 T5 1 1 Determine the confidence of the association rule A = B, where A = {I1} and B = {I2} Write your answer as a percentage value, i.e. a number in [0, 100]. Round your answer to the nearest integer. 1. 1.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781285196145Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos CoronelPublisher:Cengage Learning
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781285196145
Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:Cengage Learning