Explain why constraint checking is usually deferred in transaction processing applications.

What will be an ideal response?

Because in many transactions, the intermediate database states violate the integrity constraints but the ?nal states do not.

Computer Science & Information Technology

You might also like to view...

A website may put ________ on your computer when you visit it

A) spyware B) a cookie C) a packet D) malware

Computer Science & Information Technology

List the drawing aids available.

What will be an ideal response?

Computer Science & Information Technology