How many types of locks are there, Database Management System

Assignment Help:

Depending upon the rules we have found, we can classify the locks into two types.

Shared Lock: A transaction might be acquiring shared lock on a data item in order to read its content. The lock is shared in the sense that any other transaction can obtain the shared lock on that similar data item for reading purpose.

Exclusive Lock: A transaction might be acquiring exclusive lock on a data item in order to both read/write into it. The lock is excusive in the sense that no other transaction can acquire any type of lock (either shared or exclusive) on that similar data item.

 


Related Discussions:- How many types of locks are there

Explain the advantages of dbms over file oriented system, Explain the main ...

Explain the main advantages of DBMS over File Oriented System ?

Illustrate the view of software architecture, Illustrate the view of softwa...

Illustrate the view of software architecture A model is a semantically closed abstraction of system composes of elements. It can be visualized using any of the following five v

Write query to insert data in student table, Consider student (std_id, std_...

Consider student (std_id, std_name, date_of_birth, phone, dept_name). Put the data for a student with student id200, name arun, birth date 1 February, 1985, phone number (01110 328

Write a short note on temporary tables, Write A short note on temporary tab...

Write A short note on temporary tables? Temporary Tables - Temporary tables exists solely for a particular session, or whose data persists for the duration of the transaction

Cascading, what is cascading? what is rollback cascading? please explain in...

what is cascading? what is rollback cascading? please explain in detail

Determine that the checkpoints are a part of, 1. Determine that the Checkpo...

1. Determine that the Checkpoints are a part of  Ans: Checkpoints are a part of Recovery measures

Explain the lock based protocol, Lock Based Protocol A lock is nothing ...

Lock Based Protocol A lock is nothing but a mechanism that tells the DBMS whether a particular data item is being used by any transaction for read/write purpose. As there are t

What is a heterogeneous distributed database, What is a heterogeneous distr...

What is a heterogeneous distributed database? In a heterogeneous distributed database, dissimilar sites may use different schemas, and dissimilar dbms s/w. The sites may not be

What is the use of rename operation, What is the use of rename operation? ...

What is the use of rename operation? Rename operation is used to rename both relations and an attributes. It uses the as clause, taking the form: Old-name as new-name.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd