This is used to describe a type of network communication protocol used in client/server systems, but have nothing to do with enforcing integrity. First-fit algorithms are used in memory allocation and are not a part of enforcing integrity. Greedy algorithms are used in memory allocation and are not a part of enforcing integrity. This is made up just for this question. To enforce serialisation using locking you must follow the rules for two-phase locking. Only then is serialability enforced.
|
|