The database server cannot detect unsupported or restricted
features for which the sysams system catalog table has no setting.
Specify any precautions that an application might require for isolation
levels, lock types, and logging.
Advise users whether the access method handles logging
and data recovery. Notify users about parameters that they might set
to turn on logging. For an example, see Checking a configuration parameter
value.
Provide
the precise wording for the isolation levels that the access method
supports. It is recommended that you use standard wording for isolation
level. The following example shows the language to define the ways
in which the qualifying data set might change in the transaction. Figure 1: Sample
language to describe isolation level
The access method fully supports the ANSI Repeatable Read level of
isolation. The user need not account for dirty reads or
nonrepeatable reads. It is recommended that the user take
precautions against phantom reads.