Database Locking (graded) Databases are designed to allow multiple users to have
ID: 3652394 • Letter: D
Question
Database Locking (graded)Databases are designed to allow multiple users to have concurrent access to data. Yet this capability presents certain problems. Investigate how databases resolve multiple concurrent data management issues, including lost updates, deadlocks, and different types of lock management styles. Compare the different locking capabilities of Microsoft Access and to one other database product.
Post your analysis in the thread. Do not cut and paste from the Internet. You should also respond to other posts to add additional information, clarify points, or answer questions.
Explanation / Answer
Database locking is a varied, evolving, complicated, and technical topic. As testers, we often think that it belongs in the realm of the developer and the DBA (i.e. not my problem). But to both functional and performance testers, it is the enemy and has led to many disasters (as the presenter can personally attest). However, there is hope. This paper will shed light on the nature of database locking and how it varies between different platforms. It will also discuss the types of application issues that can arise related as a result. We will then look at ways to ferret out these issues and to resolve them before they sneak out the door with your finished product. Armed with this understanding of the enemy and how it relates to your application, you’ll be much better able to avoid disaster. The breadth and depth of this topic necessitates that scope be constrained. The scope of this paper has been chosen with the following considerations in mind: The audience is QA professionals The audience does not have significant database experience Core concepts can be generalized once understood Specifically, the scope will be constrained to: "Transactional locking" (not all types of locking) Oracle and SQL Server So why does locking occur in a database? As in other systems, database locks serve to protect shared resources or objects. These protected resources could be: Tables Data Rows Data blocks Cached Items Connections Entire Systems There are also many types of locks that can occur such shared locks, exclusive locks, transaction locks, DML locks, and backup-recovery locks. However, this paper will focus on one specific type of locking that I will call "transactional locking".
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.