Home | Previous Page | Next Page   Design Decisions > Supplying Error Messages and a User Guide >

Notifying the User About Access-Method Constraints

The database server cannot detect unsupported or restricted features for which the sysams system catalog table has no setting.

Specify any precautions that an application might require for isolation levels, lock types, and logging.

Advise users whether the access method handles logging and data recovery. Notify users about parameters that they might set to turn logging on. For an example, refer to Figure 7.

Provide the precise wording for the isolation levels that the access method supports. It is recommended that you use standard wording for isolation level. The following example shows the language to define the ways in which the qualifying data set might change in the transaction.

Figure 14. Sample Language to Describe Isolation Level
  
The access method fully supports the ANSI Repeatable Read level of
isolation. The user need not account for dirty reads or
nonrepeatable reads. It is recommended that the user take
precautions against phantom reads.
Home | [ Top of Page | Previous Page | Next Page | Contents | Index ]