answersLogoWhite

0


Best Answer

Exclusive

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What type of lock will deny users any access to a table in sql?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Is it against the law in Washington State to land-lock someones property?

Yes, in Washington State, it is illegal to land-lock someone's property. Property owners have the legal right to access their land, and intentionally restricting that access by land-locking is considered a violation of property rights.


Define Granularity in database management system?

If one application holds a lock on a database object, another application might not be able to access that object. For this reason, row-level locks, which minimize the amount of data that is locked and therefore inaccessible, are better for maximum concurrency than block-level, data partition-level or table-level locks. However, locks require storage and processing time, so a single table lock minimizes lock overhead. The LOCKSIZE clause of the ALTER TABLE statement specifies the scope (granularity)of locks at the row, data partition, block, or table level. By default, row locks are used. Only S (Shared) and X (Exclusive) locks are requested by these defined table locks. The ALTER TABLE statement LOCKSIZE ROW clause does not prevent normal lock escalation from occurring. A permanent table lock defined by the ALTER TABLE statement might be preferable to a single-transaction table lock using LOCK TABLE statement in the following cases: * The table is read-only, and will always need only S locks. Other users can also obtain S locks on the table. * The table is usually accessed by read-only applications, but is sometimes accessed by a single user for brief maintenance, and that user requires an X lock. While the maintenance program runs, the read-only applications are locked out, but in other circumstances, read-only applications can access the table concurrently with a minimum of locking overhead. For an MDC table, you can specify BLOCKINSERT for the LOCKSIZE clause in order to use block-level locking during INSERT operations only. When this is specified, row-level locking is performed for all other operations, but only minimally for INSERT operations. That is, block-level locking is used during the insertion of rows, but row-level locking is used for next-key locking if RR scans are encountered in the indexes as they are being updated. BLOCKINSERT locking might be beneficial in the following cases: * There are multiple transactions doing mass insertions into separate cells. * Concurrent insertions to the same cell by multiple transactions is not occurring, or it is occurring with enough data inserted per cell by each of the transactions that the user is not concerned that each transaction will insert into separate blocks. The ALTER TABLE statement specifies locks globally, affecting all applications and users that access that table. Individual applications might use the LOCK TABLE statement to specify table locks at an application level instead.parant post http://publib.boulder.ibm.com/infocenter/db2luw/v9r5/index.jsp?topic=/com.ibm.db2.luw.admin.perf.doc/doc/c0005271.htmlmy blog http://jacksparrowcode.blogspot.com/


How do you lock your sprint phone?

ok what you do is go to settings their should be a tab called security type in your lock code to access your settings for the lock then go to lock phone and reenter your lock code.


Where can one find a folderlock?

Folder Lock is a software program that allows users to lock certain folders from unauthorized use. A free trial of Folder Lock can be downloaded from the "Softpedia" website.


How do you secure a gun where a felon doesn't have access?

Gun safe, gun lock, lock on the door of the room when the gun is kept.


Why icant watch pornos because of child lock?

You just answered your own question.. the child lock restricts your access to them.


What does it mean to lock a topic on a forum?

It prevents users from posting in that topic unless you give them the permission to.


Describe the security features available in Windows Xp?

You can enable file encryption, user login and you can restrict users from access to files and directories. You can also lock terminals after a specific amount of time, effectively requiring the user to log in again. You can share printers, directories and files over a network, and at the same time restrict users to specific kinds of access. The security features of XP are quite extensive and a full study of them is worthy of a classroom environment.


How do I open 1972 nova trunk with broken lock?

Either drill lock out or try removing rear seat back for access


When should you change a cipher lock combination?

Whenever the combination has been compromised or when someone leaves or is no longer to have access using the lock.


What is the law about putting a padlock on a shared access gate?

shared gate lock- all need a key to access gate


What is lock escalation?

Lock escalation is the process of converting many fine-grain locks, such as a row, into fewer coarse-grain locks, such as a table. Using lock escalation reduces system overhead.