A
This is used to describe a type of network communication protocol used in
client/server systems, but have nothing to do with
enforcing integrity.
close B
First-fit algorithms are used in memory allocation and are not a part
of enforcing integrity.
close C
Greedy algorithms are used in memory allocation and are not a part
of enforcing integrity.
close D
This is made up just for this question.
close E
To enforce serialisation using locking you must follow the rules for
two-phase locking. Only then is serialability enforced.
close
Which one of the following techniques is sometimes used to solve integrity problems in a concurrent transaction scenario?
- First-come first-served
- First-fit
- Greedy algorithms
- Strassens's algorithm
- Two-phase locking
|