Database recovery and security, Database Management System

Database Recovery And Security

Introduction

In this part we will introduce two main issues relating to database management systems.

A computer system suffers from dissimilar types of failures. A DBMS controls very critical data of an organisation and thus must be reliable. Though, the reliability of the database system is related to the reliability of the computer system on which it runs.  In this part we will talk about recovery of the data having in a database system following failure of several types and present the dissimilar approaches to database recovery.  The types of failures that the computer system is likely to be subjected to contain failures of components or subsystems, power outages, software failures, accidents, unforeseen situations and natural or man-made disasters.  Database recovery methods are techniques of making the database consistent till the last possible consistent state. The aim of recovery scheme is to permit database operations to be resumed after a failure with minimum loss of information at an economically justifiable cost.

The second important issue that is being discussed in this unit is Database security. "Database security" is protection of the information included in the database against unauthorised access, destruction or modification. The first condition for security is to have Database integrity. "Database integrity" is the mechanism that is applied to ensure that the data in the database is consistent.

Posted Date: 3/12/2013 3:16:54 AM | Location : United States







Related Discussions:- Database recovery and security, Assignment Help, Ask Question on Database recovery and security, Get Answer, Expert's Help, Database recovery and security Discussions

Write discussion on Database recovery and security
Your posts are moderated
Related Questions
What is MySQL? MySQL is a relational database management system which has eleven million installations. It can be used for both Linux and Window. Managing database includes add

An entity set that does not have sufficient attributes to form a primary key is called? An entity set that doesn't have sufficient attribute to form a primary key is known as w

2NF Normal Form : A relation schema process R is in 2NF if it is in 1NF and each non-prime attribute A in R is fully functionally related on primary key. Second normal form (2N

Define According to the levels of abstraction, the schema at the intermediate level is called  Ans: As per to the levels of abstraction, the schema at the intermediate level is

The Form input elements are:             Reporter name                                                text type input             Password

The Database MySQL scripts cars_for_sale.sql and car_details.sql containing the data to use for this task have been supplied. To complete this task, you need to first create

Why DML is used for? DML is used to Manipulation and processing of database. DML is provided for manipulation & processing of database. (Data stored in the database is processed

describe all the tables you have created. ?get table_name, status, num_rows, user_stats in user_tables system view ?get table_name, constraint_name, constraint_type in user_constr

Availability: A site having the copy of a replicated relation fails, even then the relation may be found in another site. Therefore, the system may carry on to process at least th

How many types of users works on database? Users are differentiated through the way they expect to interact along with the system (i) Application programmers-interact with