Explain the lock based protocol, Database Management System

Assignment Help:

Lock Based Protocol

A lock is nothing but a mechanism that tells the DBMS whether a particular data item is being used by any transaction for read/write purpose. As there are two types of operations, i.e. read and write, whose basic nature are dissimilar, the locks for read and write operation might be behave differently.

Read operation performed by dissimilar transactions on the same data item poses less of a challenge. The value of the data item, if constant, can be read by any number of transactions at any given time.

 


Related Discussions:- Explain the lock based protocol

What is a database, What is a database? Database - Basically in simpl...

What is a database? Database - Basically in simple terms A database is a collection of inter related data and/or information stored so which it is available to several users

Develop a cards website, Project Description: I want to build a card pla...

Project Description: I want to build a card playing Website. The user should be able to 1. Login. 2. Have profile access. 3. Put money into the site. 4. Selects t

Relationship for college database, Using the concepts defined previous, we ...

Using the concepts defined previous, we have identified that strong entities in COLLEGE database are FACULTY, STUDENT, COURSE and DEPARTMENT. This database also has one weak entity

Explain derived and non-derived attribute, Explain Derived and Non-Derived ...

Explain Derived and Non-Derived Attribute? In few cases, two or more attribute values are related, for instance, Age and BirthDate attributes of a person. For specific person e

What are the two types of indices, What are the two types of indices? T...

What are the two types of indices? The two types of indices are:- A)     Dense index B)      Sparse index

Define the traditional system analysis and design, Define the Traditional S...

Define the Traditional System Analysis and Design Traditional System Analysis and Design (SAD) have three basic life cycle models. A typical software lifecycle consists of the

State the objectives-data source, You will be analysing a set of financial ...

You will be analysing a set of financial data of your choice. It is not necessary to collect any primary data of your own, and publicly available secondary data will be sufficient

Explain data abstraction, Explain data abstraction? Data abstraction Da...

Explain data abstraction? Data abstraction Data abstraction is a methodology in which enables us to isolate how a compound data object is utilized from the details of how it is

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd