Failure controlling methods, Database Management System

Assignment Help:

Failure Controlling Methods:Failures can be handled using different recovery methods that are talk about later in the unit. But the first question is doing we really require recovery techniques as a failure control mechanism?  The recovery methods are somewhat expensive both in terms of memory space and in time for small systems.  In such a case it is more useful to better avoid the failure by some checks instead of deploying recovery method to make database consistent.  Also, recovery from failure includes manpower that can be used in some other productive work if failure can be avoided.  It is, thus, main to find out some general precautions that help in controlling failure. Some of these precautions might be:

  • Having a better secondary storage system like RAID.
  • Having a regulated power supply.
  • Taking periodic backup of database states and keeping track of transactions after every recorded state.
  • setting important integrity checks in the databases as well as user interfaces.
  • Properly testing the transaction programs prior to use etc.

Though, it may be noted that if the database system is significant it must use a DBMS that is suitably equipped with recovery measures.

 

 


Related Discussions:- Failure controlling methods

In a hierarchical model of data records are organized, In a Hierarchical mo...

In a Hierarchical model of data records are organized ? In the hierarchical model of data records are organized as Tree structure.

Describe queries with complex types, Describe queries with complex types? ...

Describe queries with complex types? The present extension of the SQL query language deal with the complex type Let us start with the simple example: Find the title and t

Write short notes on schema diagram, Write short notes on Schema diagram.  ...

Write short notes on Schema diagram.  A database schema along with primary key and foreign key dependencies can be depicted pictorially by schema  diagram. Every relation appea

What is online transaction processing, What is OLTP (Online Transaction Pro...

What is OLTP (Online Transaction Processing)? In OLTP - online transaction processing systems relational database design use the discipline of data modeling and generally follo

Example of grant create session to mca12, Example -GRANT CREATE SESSION TO ...

Example -GRANT CREATE SESSION TO MCA12; (This command gives system level permission on creating a session - not portable) GRANT SELECT ON EMP TO MCA12; (Object level permi

What is the difference between serial and sequential files, What is the dif...

What is the difference between serial and sequential files? How searching is applied on both?    Ans: A serial file is one where the records have been stored in the order where

#title., losers with new information systems

losers with new information systems

Explain the terms data warehousing and data mining, Question: i) Explai...

Question: i) Explain the terms data warehousing and data mining. ii) Discuss the importance of the following security principles that a digital firm should amongst others, n

Tables, does tables are called relations

does tables are called relations

Develop and evaluate partial systems, Part 1: Security Plan Consider th...

Part 1: Security Plan Consider the Case study and identify 3 security requirements. For each of these security requirements: • Discuss the necessity for the feature and how

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd