Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the shadow paging recovery technique.
Ans: Shadow paging is a method used to acquire atomic and durable transactions, and provides the capability to manipulate pages in a database. Throughout a transaction, the pages influenced by the transaction are copied from the database file into a workspace, like volatile memory, and modified in that workspace. While a transaction is committed, all of the pages that were altered by the transaction are written from the workspace to not used pages in the database file.
Throughout execution of the transaction, the state of the database exposed to the user is that where the database existed prior to the transaction, as the database file still consist of the original versions of the modified pages, like they existed before being copied into the workspace. If a user accesses the database previous to the transaction is complete, or on the recovery of a failure, it will come out as though the transaction has not occurred.
The need for three level architecture The aim of the three level architecture is to divide each user's view of the database from the way the database is physically shown.
What is the use of keyword ISA? The use of keyword ISA is to show that a class is a specialization of another class.
1. Design the logic, using a looping structure, for a program that outputs every even number from 1 through 25 along with its square and cube. 2. Mr. Sanchez owns 12 apartme
What are the three types of data sources used with ODBC? An ODBC file data source is a file that can be shared between database users. An ODBC system data source is one that is
Sparse and Dense Indexes These indexes in principle are the similar as that of indexes used at the back of the book. The key facts of the indexes are: They are arranged
.#question. Discuss the problem which may arise during concurrency control and recovery in distributed database which are not encountered in controlized database environment.
What is the way a particular application views the data from the database that the application uses? Sub schema is the way a particular application views the data from the data
Define seek time. The time for repositioning the arm is known as the seek time and it enhances with the distance that the arm is known as the seek time.
Explain Clustering file organization (i) Determine if a record of file is physically ordered on a nonkey field - that does not comprise a different value for each record - that
Data Control The data control mostly refers to commands that permit system and data privileges to be passed to several users. These commands are usually available to database admi
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd