How many types of locks are there, Database Management System

Assignment Help:

Depending upon the rules we have found, we can classify the locks into two types.

Shared Lock: A transaction might be acquiring shared lock on a data item in order to read its content. The lock is shared in the sense that any other transaction can obtain the shared lock on that similar data item for reading purpose.

Exclusive Lock: A transaction might be acquiring exclusive lock on a data item in order to both read/write into it. The lock is excusive in the sense that no other transaction can acquire any type of lock (either shared or exclusive) on that similar data item.

 


Related Discussions:- How many types of locks are there

What you understand by client-server environment, Problem: a) Briefly d...

Problem: a) Briefly describe what you understand by Client-Server environment b) The File Server is a simple form of Client-Server. Describe the principles of the File Serve

What are the uses of odbc, What are the uses of ODBC? Under what circumstan...

What are the uses of ODBC? Under what circumstances we use this technology? ODBC expose database capabilities within a standardized way to the application programmer by an ap

Confirming.., I just purchased a document for you guys and wanted to confir...

I just purchased a document for you guys and wanted to confirm that it will be send within an hour or 2 to my email or where will document be sent to?

Mixed fragmentation, Mixed fragmentation: Sometimes, horizontal fragmentati...

Mixed fragmentation: Sometimes, horizontal fragmentation or vertical fragmentation of a database schema by itself is insufficient to sufficiently distribute the data for some appli

Primary key, The primary key is selected from the

The primary key is selected from the

Shared lock or read lock, Shared lock or Read Lock It is requested ...

Shared lock or Read Lock It is requested by a transaction that needs to just read the value of data item. A shared lock on a data item does not permit an exclusive lock

Functional Dependencies, What exactly is the concept of Functional Dependen...

What exactly is the concept of Functional Dependencies? And how do we associate this concept with the logic of Super-keys, Candidate Keys, etc? Given Relation R(A,B,C,D,E) with de

Deadlock and its prevention, Deadlock And Its Prevention: As seen earlier,...

Deadlock And Its Prevention: As seen earlier, though two phase locking protocol handles the trouble of serialisability, but it causes some troubles also. For instance, consider th

Draw an e-r diagram and convert it to a relational schema, In an organizati...

In an organization several projects are undertaken. Each project can employ one or more employees. Each employee can work on one or more projects. Each project is undertaken on the

Data manipulation language, Data Manipulation Language Data manipulatio...

Data Manipulation Language Data manipulation language (DML) describes a set of commands that are used to query and change data within existing schema objects. In this case comm

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd