In a system environment where several users have access to a database simultaneously, a
new user tries to view a data record while another user is updating the same record. In
order to assure data integrity in such circumstances, which of the following is an
appropriate control method that should be used in the DBMS?