Recovery techniques, Database Management System

Recovery Techniques:After Reading the types of failures and database errors, let us talk about how to recover from the failures. Recovery can be complete using/restoring the previous consistent state (backward recovery) or by moving forward to the next consistent state as per the committed transactions recovery (forward recovery).  Please note that a system can recover from software and hardware failures by using the forward and backward recovery only if the system log is intact.  What is the system log? We will talk about it in more detail, but first let us describe forward and backward recovery.


Posted Date: 3/12/2013 5:09:40 AM | Location : United States

Related Discussions:- Recovery techniques, Assignment Help, Ask Question on Recovery techniques, Get Answer, Expert's Help, Recovery techniques Discussions

Write discussion on Recovery techniques
Your posts are moderated
Related Questions
The clause in SQL which specifies that the query result should be sorted in ascending or descending order based upon the values of one or much more columns is Ans : Order by

What is transaction? Collections of operations that form a single logical unit of work are known as transactions.

Define the phases of two phase locking protocol Growing phase: a transaction may get locks but not release any lock. Shrinking phase: a transaction might be release locks bu

What do you understand by RAID? Explain RAID Level 4 and Level5? RAID - It is stands for Redundant Array of Inexpensive Disks (as named by the inventor), or alternatively Re

The Structured Query Language INTRODUCTION Database is an organised set of information about an entity having controlled redundancy and serves numerous applications. DBMS

Problem: A DBMS built for Online Transaction Processing (OLTP) is usually regarded as unsuitable for data warehousing. Each system is designed with a different set of requireme

Question 1 Explain the functions of the following Storage Manager Buffer Manager Transaction Manager 2 Discuss about system catalog in a relational DBMS 3

Most computer systems authenticate users by asking them for the user name and password. However, the user names and passwords often can be guessed by hackers. Suggest an automated,