NTA-NET (UGC-NET) Computer Science & Applications (87) Computer Structure and Organisation-Security Study Material (Page 10 of 17)

Choose Programs:

⏳ 🎯 Online Tests (4 Tests [100 questions each]): NTA Pattern, Analytics & Explanations

Rs. 800.00 -OR-

3 Year Validity (Multiple Devices)

Sample TestsDetailsSee Demo

🎓 Study Material (2083 Notes): 2024-2025 Syllabus

Rs. 1250.00 -OR-

3 Year Validity (Multiple Devices)

Topic-wise Notes & SampleDetails

🎯 2699 MCQs (& PYQs) with Full Explanations (2024-2025 Exam)

Rs. 600.00 -OR-

3 Year Validity (Multiple Devices)

CoverageDetailsSample Explanation

Help me Choose & Register (Watch Video) Already Subscribed?

Two-Phase Database Update

Edit
Two-Phase Update
  • The intent phase: the DBMS pulls all resources needed to perform the update
  • Committing: This involves addition of commit flag to the database. The commit flag makes changes permanent that cannot be roll backed.

Example:

  • The stock keeper verifies with the database whether 50 boxes of strings are available. If not available, the requisition gets rejected and the transaction finishes.
  • If strings are enough in number in stock, the stock keeper reduces the inventory by 50 and reflects into the database (107 - 50 = 57) .
  • The stock…

… (421 more words, 18 figures) …

Subscribe (by clicking here) to view full notes and track progress.

Database Security: Monitors, Sensitive Data and Access Decisions Types of Disclosures

Edit

Monitors

The monitor is the unit of a DBMS responsible for the structural integrity of the database.

Forms of Monitors

  • Range Comparisons: A range comparison monitor tests each new value to ensure that the value is within an acceptable range
  • Filters or patterns are more general types of data form checks.
  • State constraints describe the condition of the entire database.
  • Transition constraints describe conditions necessary before changes can be applied to a database.

Sensitive Data

  • Sensitive data are data that should not be made public.
  • There exist cases that some but not all the elements in the database are sensitive.
  • There may be varying…

… (241 more words) …

Subscribe (by clicking here) to view full notes and track progress.