multiple-mode locks, Database Management System

Assignment Help:

Multiple-mode locks: It offers two locks: exclusive locks and shared locks. But why do we require these two locks? There are a lot of transactions in the database system that never updates the data values. These transactions can coexist with some other transactions that update the database. In such a condition multiple reads are permitted on a data item, so multiple transactions can lock a data item in the read or shared lock. On the other hand, if a transaction is an updating transaction, i.e., it updates the data items, it has to make sure that no other transaction can access (read or write) those data items that it needs to update. In this situation, the transaction places an exclusive lock on the data items. Therefore, a somewhat higher level of concurrency can be achieved in comparison to the binary locking scheme


Related Discussions:- multiple-mode locks

Define- relational algebra, Define- relational algebra. The relational ...

Define- relational algebra. The relational algebra is a procedural query language. It having of a set of operations that take one or two relation as input and make a new relati

What is the use of group by clause, What is the use of group by clause?  ...

What is the use of group by clause?  Group  by  clause  is  used to apply  aggregate  functions  to a  set  of  tuples. The attributes given in the group by clause are used to

Define null value, Define NULL value NULL value NULL means something is...

Define NULL value NULL value NULL means something is unknown. It does NOT mean null (the digit 0). Null is as well employed as attribute value for a particular entity in which

Anomalies, define anomalies and different types of anomalies with example

define anomalies and different types of anomalies with example

Attributes, Attributes and its types explain?

Attributes and its types explain?

Field, examples of fields in a database

examples of fields in a database

Explain the log based recovery method, Explain the Log Based Recovery Metho...

Explain the Log Based Recovery Method? The system log that is generally written on stable storage consists of the redundant data required to recover from volatile storage failu

Example on relational database schema, Question: The following relation...

Question: The following relational database schema corresponds to a part of a database used by the Registry Department of a university. DEPARTMENT (d#, d-name, head-of-dept)

What is called an evaluation primitive, What is called an evaluation primit...

What is called an evaluation primitive? A relational algebra operation annotated with instructions on how to evaluate is known as an evaluation primitive.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd