0
0
DBMS Theoryknowledge~5 mins

Lock-based protocols in DBMS Theory - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is a lock-based protocol in database management?
A lock-based protocol is a method used to control access to data in a database by locking data items. It ensures that transactions do not interfere with each other, maintaining data consistency and preventing conflicts.
Click to reveal answer
beginner
What are the two main types of locks used in lock-based protocols?
The two main types of locks are:<br>1. Shared Lock (S-lock): Allows multiple transactions to read a data item.<br>2. Exclusive Lock (X-lock): Allows a transaction to write or modify a data item exclusively.
Click to reveal answer
intermediate
Explain the purpose of the Two-Phase Locking (2PL) protocol.
Two-Phase Locking (2PL) ensures serializability by dividing a transaction's locking actions into two phases:<br>1. Growing phase: Locks are acquired and no locks are released.<br>2. Shrinking phase: Locks are released and no new locks are acquired.<br>This prevents conflicts and ensures correct transaction order.
Click to reveal answer
intermediate
What problem can occur if locks are not managed properly in lock-based protocols?
Deadlock can occur when two or more transactions wait indefinitely for locks held by each other, causing the system to freeze or stall.
Click to reveal answer
beginner
How does a shared lock differ from an exclusive lock in terms of transaction access?
A shared lock allows multiple transactions to read the same data simultaneously but prevents writing. An exclusive lock allows only one transaction to write or modify the data and prevents others from reading or writing until the lock is released.
Click to reveal answer
What does an exclusive lock allow a transaction to do?
AWrite or modify data exclusively
BRead data only
CRead data with other transactions
DRelease locks early
Which phase in Two-Phase Locking is when locks are acquired?
AShrinking phase
BWaiting phase
CGrowing phase
DReleasing phase
What problem arises when two transactions wait for each other's locks indefinitely?
ADeadlock
BRollback
CStarvation
DCommit failure
Which lock type allows multiple transactions to read the same data simultaneously?
ANone of the above
BExclusive lock
CWrite lock
DShared lock
Why are lock-based protocols important in databases?
ATo speed up data entry
BTo prevent data conflicts and ensure consistency
CTo delete old data
DTo backup data automatically
Describe how Two-Phase Locking (2PL) works and why it is important.
Think about the order of locking and unlocking in a transaction.
You got /5 concepts.
    Explain the difference between shared and exclusive locks with examples.
    Consider who can access the data and how.
    You got /4 concepts.