More details are provided below about the lock acquisition policy implemented by the methods mentioned…