Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the shadow paging recovery technique.
Ans: Shadow paging is a method used to acquire atomic and durable transactions, and provides the capability to manipulate pages in a database. Throughout a transaction, the pages influenced by the transaction are copied from the database file into a workspace, like volatile memory, and modified in that workspace. While a transaction is committed, all of the pages that were altered by the transaction are written from the workspace to not used pages in the database file.
Throughout execution of the transaction, the state of the database exposed to the user is that where the database existed prior to the transaction, as the database file still consist of the original versions of the modified pages, like they existed before being copied into the workspace. If a user accesses the database previous to the transaction is complete, or on the recovery of a failure, it will come out as though the transaction has not occurred.
What is the disadvantage of a call by reference? During a call by reference damage or loss of data is not restricted to the subroutine, but will instantly lead to alters to th
How many levels can be viewed in Architecture of the database ? Architecture of the database can be viewed as three levels.
What is conceptual schema? The schemas at the view level are known as subschema that describe dissimilar views of the database.
Give a sample of the Dynamic Model. The sample of dynamic model is given below: Dynamic model for the car: Brake and Accelerator Brake or Applies Accelerator
After going by the database architecture, let us now dwell on an important query: how is the data organised in a database? There are a lot of basic structures that exist in a datab
Explain the term- Periodic recomputation Periodic recomputation: Base values are often updated in bunches. Sometimes, it is possible to just recompute all derived attributes p
Define in which normalisation form if an attribute of a composite key is dependent on an attribute of other composite key. Ans: 3NF A relation is in 3 NF if an attribute of
State about the Tables- DBMS Data is stored in columns and rows (much like a spreadsheet -main difference is how data is organised). Every row in a table is known as a record
how the string works as keyword?
Deadlock And Its Prevention: As seen earlier, though two phase locking protocol handles the trouble of serialisability, but it causes some troubles also. For instance, consider th
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd