How many types of locks are there, Database Management System

Assignment Help:

Depending upon the rules we have found, we can classify the locks into two types.

Shared Lock: A transaction might be acquiring shared lock on a data item in order to read its content. The lock is shared in the sense that any other transaction can obtain the shared lock on that similar data item for reading purpose.

Exclusive Lock: A transaction might be acquiring exclusive lock on a data item in order to both read/write into it. The lock is excusive in the sense that no other transaction can acquire any type of lock (either shared or exclusive) on that similar data item.

 


Related Discussions:- How many types of locks are there

Identify the critical activities, Consider a systems development project wi...

Consider a systems development project with the following data Activity                                Duration (weeks)        Precedence Relationship 1. Software design

Explain what is relation, Explain What is Relation? A database relatio...

Explain What is Relation? A database relation is a predefined row or column format for storing information in a relational database. Relations are equal to tables.

Explain the concept of a data model, Explain the concept of a data model ? ...

Explain the concept of a data model ? Data Model - Model is an abstraction procedure which hides irrelevant details although highlighting details relevant to the application

Complexity- drawbacks of data distribution, Complexity : A distributed DBMS...

Complexity : A distributed DBMS that is available, reliable, and secure is inherently more difficult than a centralised DBMS. Though, adequate data replication is essential to have

Adjustments are required to increase chances of inheritance, What types of ...

What types of adjustments are required to increase chances of inheritance. a)   Some attributes can be added or ignored in  the base class operation  b) Some changes can be

Define deadlock recovery measures, Define Deadlock recovery measures       ...

Define Deadlock recovery measures                   To recover from deadlock, the cycle in the wait-for-graph should be broken. The common technique of doing this is to rollbac

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

What is the use of group by clause, What is the use of group by clause?  ...

What is the use of group by clause?  Group  by  clause  is  used to apply  aggregate  functions  to a  set  of  tuples. The attributes given in the group by clause are used to

Exclusive lock, Exclusive lock It is asked for by a transaction on...

Exclusive lock It is asked for by a transaction on a data item that it wants to update. No other transaction can put either a shared lock or an exclusive lock on a dat

Objectives-database recovery and security, Objectives Define the te...

Objectives Define the terms RECOVERY and INTEGRITY; Define Recovery Techniques; Explain Error and Error detection techniques, and Define types of Authorisation.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd