AIncorrect Answer

This is used to describe a type of network communication protocol used in client/server systems, but have nothing to do with enforcing integrity.

close

BIncorrect Answer

First-fit algorithms are used in memory allocation and are not a part of enforcing integrity.

close

CIncorrect Answer

Greedy algorithms are used in memory allocation and are not a part of enforcing integrity.

close

DIncorrect Answer

This is made up just for this question.

close

ECorrect Answer

To enforce serialisation using locking you must follow the rules for two-phase locking. Only then is serialability enforced.

close

A B C D E TELL ME NEXT INDEX
 
 
Which one of the following techniques is sometimes used to solve integrity problems in a concurrent transaction scenario?
  1. First-come first-served
  2. First-fit
  3. Greedy algorithms
  4. Strassens's algorithm
  5. Two-phase locking