Define check point and its impact on data base recovery, Database Management System

Assignment Help:

Define check point and its impact on data base recovery.                

 Ans:  There could be hundreds of transactions handled per minute, in a large on-line database system. The log for this kind of database consists of a very large volume of information. A scheme called checkpoint is utilized to limit the volume of log information that has to be handled and processed in the event of a system failure including the loss of volatile information. The checkpoint scheme is an extra component of the logging scheme. A checkpoint operation carried out periodically, copies log information onto stable storage. For all transactions active at checkpoint, their identifiers and their database modification actions that at that time are reflected just only in the database buffers, will be propagated to the suitable storage.


Related Discussions:- Define check point and its impact on data base recovery

A weak entity set and its identifying relationship, Q.  Define a weak entit...

Q.  Define a weak entity set and its identifying relationship. List the necessary conditions for a meaningful identifying relationship set of a weak entity set.    Entity is a t

Define the one-way associations, One-way Associations When an associat...

One-way Associations When an association is traversed only in the one direction, then it is implemented as a pointer i.e.an attribute which contains an object reference. If mu

What is the object-oriented decompositions, Object-oriented decompositions ...

Object-oriented decompositions Object-oriented decompositions of systems better are able to cope with change. Each subsystem has a well-defined interface which communicates with

Lock, lock and types of lock

lock and types of lock

Explain discretionary access control, Problem: (a) Given the following ...

Problem: (a) Given the following relation: Stats(Name,Sex,Children, Occupation, Salary, Tax, Audits) Write SQL code to define the following security constraints: (i) User

Distinguish among a datareader class and a dataset class, Question (a) ...

Question (a) Concurrent access to data from a database is a normal part of application program usage. Describe three approaches to concurrency control (b) Distinguish among

List any eight applications of dbms, List any eight applications of DBMS. ...

List any eight applications of DBMS. a) Universities b) Airlines c) Banking d) Credit card transactions e) Tele communication f) Sales g)Finance h) Manufac

Databases and data warehouses , Databases and data warehouses both are data...

Databases and data warehouses both are databases and both contains number of rows and columns of tables containing data. Data warehouse is really different from databases because d

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd