ACID Explanation and Demonstration Paper
.docx
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
408
Subject
Computer Science
Date
May 1, 2024
Type
docx
Pages
5
Uploaded by vanevalleverdugo02 on coursehero.com
1
ACID Explanation and Demonstration Paper
Vanessa Verdugo
Grand Canyon University
SYM-408
Brian Letort
November 12
th
, 2023
2
ACID Explanation and Demonstration Paper
The ACID Test: Components and an Example
ACID is an acronym that stands for atomicity, consistency, isolation, and durability. These types of properties allow and guarantee databases be processed in safe way. If a row in the
system fails at any point of the process it will capture it and make sure the information is not lost and will guarantee the transaction made. For database recovery ACID is needed since it provides major principles. First, atomicity which means that the transaction was made at its fullest or the transaction was not made. Next, consistency means that the transaction that was made is not causing any constraints or its not violating with the process (Watts, 2020). Isolation comes right after which refers to the transaction not interfering with other transactions, making sure everything is aligned. Finally, durability, which means that even if transaction effects will be kept
permanently even if the server crashes it will be properly stored (Watts, 2020). ACID should adhere to database transactions to ensure that the transaction does not become corrupt (Ian, 2023). To keep databases safe and free from any kind of alteration is key for a database administrator. Collateral Damage in Update Query
Collateral damage happens when you update a query and certain fields damage other data
in the process. A database management system is built with some of the most complex software ever written, this is why the issue should be diffused before it arouses. An update query is a database operation that changes values of the rows, it searches for rows that that need to be modified according to the instructions in the query. If there is any type of mistake in the query it will modify each row that was not supposed to be changed, this is an effect on the rows and this
3
is what collateral damage is essentially. For example, a table of customer orders and an update query is being done to change the status of the products code. If there is a mistake in the query it will have a change to the code regardless of whatever the code might be, this would be considered an unintended modification. Data inconsistency can be detrimental and can cause serious consequences, such as data loss, data integrity, and accuracy. Overall, there are multiple steps that can be taken to avoid collateral damage. A test review update should be done to the queries before executing them. Also, features such as transaction logs and backups to minimize the risk and impact of any modification that can be unintentionally done. Overall, the use of safeguards is essential to prevent collateral damage. Locking Prevents Dirty Reads
The locking mechanism in a server is essential to a successful SQL Server transaction processing and it is well designed to allow SQL Server to work successfully (Dimitrijevic, 2017).
Locks are in-memory structures that are 96 bytes in size, these protect and hash the resource. This mechanism is designed to ensure the integrity of the data in the database, at the same time it
allows the SQL Server to pass the transaction ACID test (Dimitrijevic, 2017). SQL Server locking is very essential for the isolation requirement, and it serves to lock objects affected by a transaction that is being made, this will prevent other transactions from making any change in the
data stored. Once the lock has been released by taking back changed to how they were initially, other transactions will be allowed to make required data changes. There are various types of lock
modes for example exclusive (X), shared (S), update (U), intent (I), schema (Sch), bulk update (BU). There are also conversion locks, regular intent locks, and locking hierarchy. The locking hierarchy is applied when a change of data is performed, it starts with the database then down to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Another action may be triggered by the execution of a trigger. There is often a
limit on how deep nesting may go in database systems. Why could they impose
such a restriction?
arrow_forward
A tool that can help designers understand the dependencies of database structures is a
arrow_forward
Project Synopsis:
DATABASE MANAGEMENT:ABC Walk-in Clinic is located in a large metropolitan city in Canada. The clinic staff consists of ten doctors, six nurses, five office secretaries, two administrative assistants and one manager. First time Patients have to visit the clinic personally and fill a registration form that contains their personal and health related information. An office secretary would then enter that information in the computer based information system.
Patients may become a permanent patient (at any time) for one of the doctors at the clinic by filling up necessary forms (they are called enrolled patients) or they may choose to come walk-in for every visit. (They usually called walk-in patients) Enrolled Patients may book their appointments online or by calling, the office and one of the secretaries would then book their appointment with their doctor on a particular day/time. Any booked appointment may be cancelled up to 24 hours in advance after which the clinic…
arrow_forward
A top-to-bottom relationship among the items in a database is established by a
arrow_forward
A trigger's execution might result in the execution of another action. The depth of nesting in most database systems has a limit. Explain why they would put such a restriction in place.
arrow_forward
A database has been designed to display a list of
popular movies and also a list of actors acting in these
movies. The relationship that would exist between the
related tables would be:
O many to many
one to many
O many to one
O one to one
arrow_forward
This kind of interaction is impossible in a relational database, as seen by the preceding instances.
arrow_forward
Take for instance the concept of "snapshot isolation" while designing a database for an airline. Is it prudent for airlines to choose a tactic that does not lend itself to serialization in the event that they are able to improve their overall performance?
arrow_forward
Explain the concept of read uncommitted isolation level. Give an example of how it is used.
arrow_forward
Describe the concept of "lazy loading" in the context of database connectivity.
arrow_forward
Can an error in a database system be considered more severe than one that happens elsewhere?
arrow_forward
Define the term "concurrency" in the context of databases.
arrow_forward
True or false: The database management system can protect you in a number of ways from getting invalidated into the database in the first place through a series of rules called "referential constraints". Sometimes they are implemented through a new related data table.
arrow_forward
Define a tuple in database.
arrow_forward
Transaction management deals with the problems of always keeping the database in a consistent state even when concurrent accesses and failures occur. Isolation requires that each transaction sees a consistent database at all times and that an executing transaction cannot reveal its results to other concurrent transactions before its commitment.
ANSWER
If two concurrent transactions access a data item that is being updated by one of them, it is not possible to guarantee that the second will read the correct value. Dirty reads and nonrepeatable reads may occur when one transaction can see intermediate results of another transaction before it has been committed.. Given below are two concurrent transactions T1 and T2 whose balances of amount x
(balx) were recorded at times t, between t₁ and tg. As shown in the table below:
If these two transactions interfere with each other, fill in the table below by selecting from the drop down list the values of balance X (bal,) at specified times…
arrow_forward
In a database system, the allocation of records to blocks has a significant impact on its performance.
arrow_forward
In the case of a physical database, where do you begin?
arrow_forward
Explain the concept of data synchronization and its importance in the context of data binding.
arrow_forward
A top-to-bottom relationship forms a link between the components in a database.
arrow_forward
All data request scenarios should be tested in a distributed database.
arrow_forward
Indexing structures like the R-tree and B-tree effectively store and retrieve database data in computer science.
arrow_forward
When it comes to a bank's database, consider a system that uses snapshot isolation. In certain cases, the bank may encounter difficulties due to an execution that cannot be serialized.
arrow_forward
What are the potential pitfalls of excessive or improper use of data binding?
arrow_forward
There are several potential data-access patterns in a distributed database system.
arrow_forward
Take, for example, a database that is used by a large airline and in which the underlying database management system utilises snapshot isolation. In spite of the fact that the airline would prefer a serializable execution, it could be ready to tolerate a non serializable execution if it means that the process would be completed more quickly overall.
arrow_forward
Is a mistake in a database system more severe than a mistake elsewhere?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Another action may be triggered by the execution of a trigger. There is often a limit on how deep nesting may go in database systems. Why could they impose such a restriction?arrow_forwardA tool that can help designers understand the dependencies of database structures is aarrow_forwardProject Synopsis: DATABASE MANAGEMENT:ABC Walk-in Clinic is located in a large metropolitan city in Canada. The clinic staff consists of ten doctors, six nurses, five office secretaries, two administrative assistants and one manager. First time Patients have to visit the clinic personally and fill a registration form that contains their personal and health related information. An office secretary would then enter that information in the computer based information system. Patients may become a permanent patient (at any time) for one of the doctors at the clinic by filling up necessary forms (they are called enrolled patients) or they may choose to come walk-in for every visit. (They usually called walk-in patients) Enrolled Patients may book their appointments online or by calling, the office and one of the secretaries would then book their appointment with their doctor on a particular day/time. Any booked appointment may be cancelled up to 24 hours in advance after which the clinic…arrow_forward
- A top-to-bottom relationship among the items in a database is established by aarrow_forwardA trigger's execution might result in the execution of another action. The depth of nesting in most database systems has a limit. Explain why they would put such a restriction in place.arrow_forwardA database has been designed to display a list of popular movies and also a list of actors acting in these movies. The relationship that would exist between the related tables would be: O many to many one to many O many to one O one to onearrow_forward
- This kind of interaction is impossible in a relational database, as seen by the preceding instances.arrow_forwardTake for instance the concept of "snapshot isolation" while designing a database for an airline. Is it prudent for airlines to choose a tactic that does not lend itself to serialization in the event that they are able to improve their overall performance?arrow_forwardExplain the concept of read uncommitted isolation level. Give an example of how it is used.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning