What do you mean by dirty read ?
Answers were Sorted based on User's Feedback
Answer / ram g
dirty read is an isolation level. it wont give exclusive
lock on table. what it says is that..when the user1 start
reading db and inserting a row1 while user2 reads row1 now
user1 rollback data now user2 read data which is not really
exist.
| Is This Answer Correct ? | 5 Yes | 1 No |
Answer / vinod
The "dirty read" technique can be used to provide a high
degree of concurrent access to VSAM files while avoiding
the complications associated with CI and CA splits. The
dirty read protocol can be summarized as follows:
1.The VSAM file must be defined with cross-region
SHAREOPTIONS 4.
2.The file must be allocated with DISP=SHR.
3.All operations on the file, including reads, must be
preceded with an ENQ for the data set. The data set name is
specified for the ENQ "rname", but any string can be used
for the ENQ "qname" (though it must be the same string for
all accessors).
4.After a lock is obtained, the user's buffer must be
refreshed with a GET request. This step also applies to new
record insertions.
5.At the end of all file operations, the enqueue is
released with a DEQ function call.
6.No lock is held during a wait (such as terminal input
wait).
7.Before updating a previously read record, a fresh copy of
the record must be obtained and compared to the original to
ensure that no other user has updated the record while it
was being browsed and modified. As always, the second read,
the record comparison, and the update must be shielded by a
lock.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / kaniyan
If one user put intent exclusive lock on a page or a table
or table space, at that time some wants to read the
content. He will get junk values. This is called dirty
read.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / mr.shashi kant yadav
A transaction reads the data that has not been committed by the other transaction.This can create problems if a transaction that has added the data is rolled back.
| Is This Answer Correct ? | 0 Yes | 0 No |
is it required that primary key values have to be unique? Do alternate key values have to be unique?
What does the KEYRANGES parameter in Define Cluster commend do?
what is a base cluster in vsam?
What are the different types of VSAM files available?
Is a delete operation possible in an ESDS?B. Is rewrite operation possible in ESDS ?
How do you calculate record size of an alternate cluster?
How to open VSAM file from 3.4? i have millions of records and i dont want to use the print ch ids(/) command bcz it takes to much time. so if you have any another command to open this plz tell me.
Using alternate indexes in batch program?
What is the use of KSDS,LDS,ESDS,RRDS??what is VRRDS?? How are all these useful in realtime scenario??Plz helpme out...Its a recent question in IGATE..
What are the different versions of gdg named?
How do I declare the KSDS vsam so that I can store a reocrd with variable length?.
explain in brief what are the 3 types of vsam files?