How many types of locks are there, Database Management System

Assignment Help:

Depending upon the rules we have found, we can classify the locks into two types.

Shared Lock: A transaction might be acquiring shared lock on a data item in order to read its content. The lock is shared in the sense that any other transaction can obtain the shared lock on that similar data item for reading purpose.

Exclusive Lock: A transaction might be acquiring exclusive lock on a data item in order to both read/write into it. The lock is excusive in the sense that no other transaction can acquire any type of lock (either shared or exclusive) on that similar data item.

 


Related Discussions:- How many types of locks are there

What is theta join explain, What is theta join explain? Theta  Join  -...

What is theta join explain? Theta  Join  - The  theta  join  operation  is  an  extension  to  the  natural-join operation which permits us to merge selection and a Cartesian

Explain two phase locking protocol, Explain Two phase locking protocol ...

Explain Two phase locking protocol A transaction is consider as to follow the two-phase locking protocol if all locking operations precede the first unlock operation in the tra

Concurrency control, discuss the purpose of the concurrency control?

discuss the purpose of the concurrency control?

Thid, describe objectivde of file organisation

describe objectivde of file organisation

Explain the structured decomposition, Differentiate between the object orie...

Differentiate between the object oriented decomposition and the structured decomposition? Process-oriented (structural) decomposition divides a complex process, function or tas

List the armstrong axioms for functional dependencies, List the Armstrong's...

List the Armstrong's axioms for functional dependencies.  What do you understand by soundness and completeness of these axioms?      Ans: The Armstrong's axioms are: F1:

Keys - relational database integrity, Candidate Key:  In a relation R, a ca...

Candidate Key:  In a relation R, a candidate key for R is a subset of the set of attributes of R, which have the differnt two properties: (1)        Uniqueness:                N

Give an example of enforcement in typing, Give an example of enforcement in...

Give an example of enforcement in Typing. You can understand the idea of enforcement as it makes sure objects of dissimilar classes may not be interchanged as below:  Exampl

Differance between internal and external schema, Differance between interna...

Differance between internal and external schema? Internal and external schema: Internal Schema • Describes the physical storage structure • Uses a physical data model External

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd