adplus-dvertising
frame-decoration

Question

The size of a lock is called:

a.

implicit lock

b.

lock granularity

c.

exclusive lock

d.

shared lock

Posted under DBMS

Answer: (b).lock granularity

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The size of a lock is called:

Similar Questions

Discover Related MCQs

Q. A cursor type in which the application sees the data as they were at the time the cursor was opened is called:

Q.
Locks placed by the DBMS are called ________ .

Q. If an transaction is performed in a database and committed, the changes are taken to the previous state of transaction by

Q. When the transaction finishes the final statement the transaction enters into

Q. Which of the following is an atomic sequence of database actions?

Q. DBMS periodically suspends all processing and synchronizes its files and journals through the use of

Q. A race condition occurs when

Q. Data integrity control

Q. The type of constraints that specifies the uniqueness of data stored in the database are considered as

Q. The property of DBMS which ensures the execution of all the operations in transaction or none of the operation is executed is classified as

Q. The control feature in database management system which ensures the accuracy of data updated by multiple users is classified as

Q. The property of DBMS which ensures whether the hundreds of applications are executed, each transaction must be executed in isolation is classified as

Q. If a transaction has obtained a __________ lock, it can read but cannot write on the item

Q. If a transaction has obtained a ________ lock, it can both read and write on the item

Q. A transaction can proceed only after the concurrency control manager ________ the lock to the transaction

Q. If a transaction can be granted a lock on an item immediately in spite of the presence of another mode, then the two modes are said to be ________

Q. A transaction is made to wait until all ________ locks held on the item are released

Q. State true or false: It is not necessarily desirable for a transaction to unlock a data item immediately after its final access

Q. The situation where no transaction can proceed with normal execution is known as ________

Q. The protocol that indicates when a transaction may lock and unlock each of the data items is called as __________