Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is Lock Based Protocol and what is its use?

Answers were Sorted based on User's Feedback



What is Lock Based Protocol and what is its use?..

Answer / bhargavi

lock based protocol: Once one transaction is accessing the
data,no other transaction is made to modify the data.

(or)

A locking protocol is a set of rules to be followed by each
transaction to ensure that, even though actions of several
transactions might be interleaved,the net effect is
identical to executing all transactions in some serial order.

Is This Answer Correct ?    55 Yes 9 No

What is Lock Based Protocol and what is its use?..

Answer / amit yadav

A lock is a mechanism to control concurrent access to a data
item
Data items can be locked in two modes :
1. exclusive (X) mode. Data item can be both read as well as
written. X-lock is requested using lock-X instruction.
2. shared (S) mode. Data item can only be read. S-lock is
requested using lock-S instruction.

Lock requests are made to concurrency-control manager.
Transaction can
proceed only after request is granted.

Is This Answer Correct ?    8 Yes 0 No

Post New Answer

More Advanced Java Interview Questions

To identify IDL language what mapping mechanism is used?

0 Answers  


Which are the different segments of memory?

0 Answers  


what is stringBuffer and StringBuilder?

3 Answers  


What is the priority of Garbage collector thread?

3 Answers  


Difference Between java & javax

5 Answers   Sun Microsystems, Wipro,


Are we allowed to change the transaction isolation property in middle of a transaction?

0 Answers  


what is Activation Instantinator?

0 Answers  


What is diffennce between AWT & SWING?

4 Answers  


What is a sessionfactory? Is it a thread-safe object?

0 Answers  


Why is string immutable in java?

0 Answers  


What is clustering? What are the different algorithms used for clustering?

0 Answers  


How to implement RMI in Java?

0 Answers   TCS,


Categories