FTAM/9000 User's Guide
74 Chapter 5
FTAM File Protection
Introduction to FTAM File Protection
Concurrency Control
The following table lists each valid concurrency control value (or “lock”)
which can be applied to a file action, and its associated code for use in
action/concurrency strings:
Table 5-2 Concurrency Control Locks
Lock
Name
Code
Letter
Explanation
You
perform
the
action
Others
perform
the
action
Shared S Use shared–access when you need to
perform the action, and would not
experience conflict if other users
simultaneously perform same action.
Yes Yes
eXclusive X Use exclusive–access when you need to
perform the action, and would experience
conflict if other users simultaneously
perform same action.
Yes No
No access N Use no–access when you do not need (or are
not allowed) to perform the action, but you
would experience conflict if other users
perform that action on the file while you use
it.
No No
not
required
# Use not–required access when you do not
need (or are not allowed) to perform the
action, and would not experience conflict if
other users perform that action on the file
while you use it.
No Yes