Software failures-database recovery and security, Database Management System

Software failures:  In such cases, a software error abruptly stops the implementation of the current transaction (or all transactions), therefore leading to losing the state of program implementation and the contents / state of the buffers.  But what is a buffer? A buffer is the portion of RAM that kept the partial contents of database that is currently needed by the transaction. The software failures can further be subdivided as:

a)   Application or Statement program failure

b)   DBMS software failure

c)   Failure due to viruses

d)   Operating system failure

A Statement of program may cause abnormal termination if it does not implement totally.  This happens if during the implementation of a statement, an integrity constraint gets desecrated. This leads to irregular termination of the transaction because of which any prior updates made by the transaction may still get reflected in the database going it in an inconsistent state.

A failure of transaction can happen if some code in a transaction program leads to its abnormal termination. For instance, a transaction can go into an infinite loop.

In such a case the only technique to break the loop is to abort the program.  Likewise, the failure can be traced to the DBMS or operating system and transactions are aborted abruptly. Therefore part of the transaction that was implemented before abort may cause some updates in database, and therefore the database is updated only partially which leads to an inconsistent state of database.

Posted Date: 3/12/2013 3:33:26 AM | Location : United States







Related Discussions:- Software failures-database recovery and security, Assignment Help, Ask Question on Software failures-database recovery and security, Get Answer, Expert's Help, Software failures-database recovery and security Discussions

Write discussion on Software failures-database recovery and security
Your posts are moderated
Related Questions
Question: i) Explain the terms data warehousing and data mining. ii) Discuss the importance of the following security principles that a digital firm should amongst others, n

Explain the term - Adjustment of inheritance The inheritance can be enlarged as object design progresses by changing class structure. The designer should do: i) Adjust or r

Explain the function of Object model Object model describes the classes of objects in system, including their attributes and operations which they support. The analysis object

In a relational model how relations are termed? In a relational model, relations are termed as tables. (The term ‘relation’ is the technical name of the ‘table’ in RDBMS)

What is ODBC ? ODBC - Open DataBase Connectivity which is also denoted by ODBC enable the integration of SQL along with a common-purpose programming language. ODBC expose data

Explain the utilities which help the DBA to manage the database? Every DBA uses database utilities to maintain and control their databases. But there is a lot of confusion wit

a method named WonGame that checks each letter in the word is matched by its label

The participation Constraints shows whether the existence of an entity depends on its being associated to another entity by the relationship type. There are two kinds of participat

Explain the θ-join and equijoin Refer tables Car and Boat which list models of cars and boats and their relevant prices. Assume a customer wants to buy a car and a boat, but sh

Define deadlock avoidance. An alternative method for avoiding deadlocks is to needs additional information about how resources are to be requested. Each request requires the s