Database recovery and security, Database Management System

Assignment Help:

Database Recovery And Security

Introduction

In this part we will introduce two main issues relating to database management systems.

A computer system suffers from dissimilar types of failures. A DBMS controls very critical data of an organisation and thus must be reliable. Though, the reliability of the database system is related to the reliability of the computer system on which it runs.  In this part we will talk about recovery of the data having in a database system following failure of several types and present the dissimilar approaches to database recovery.  The types of failures that the computer system is likely to be subjected to contain failures of components or subsystems, power outages, software failures, accidents, unforeseen situations and natural or man-made disasters.  Database recovery methods are techniques of making the database consistent till the last possible consistent state. The aim of recovery scheme is to permit database operations to be resumed after a failure with minimum loss of information at an economically justifiable cost.

The second important issue that is being discussed in this unit is Database security. "Database security" is protection of the information included in the database against unauthorised access, destruction or modification. The first condition for security is to have Database integrity. "Database integrity" is the mechanism that is applied to ensure that the data in the database is consistent.


Related Discussions:- Database recovery and security

Determine the term- active values, Determine the term- Active values An...

Determine the term- Active values An active value is that has dependent values. Every dependent value registers itself with active value that contains a set of dependent values

Which is an advantage of view, Which is an advantage of view? The Advan...

Which is an advantage of view? The Advantages of view is Data security, Derived columns and Hiding of complex queries

Working and processing files, 1.  Define each of the following IN YOUR OWN ...

1.  Define each of the following IN YOUR OWN WORDS: (a)   File: (b)   Record: (c)   Field: (d)   Primary Key: (e)   Secondary Key: 2.  A travel agency wants t

Define catalog and meta data, Define Catalog and meta data ? A catalog ...

Define Catalog and meta data ? A catalog is a compilation of records elaborating the contents of a particular collection or group of collections. Metadata (Meta data, or someti

What is the function of io/m signal in the 8085, What is the function of IO...

What is the function of IO/M signal in the 8085? It is a status signal. It is used to differentiate among memory locations and I/O operations. When this signal is low (IO/M = 0

Answer, Describe multi key files

Describe multi key files

What is the error handling, What is the error handling Traditionally, b...

What is the error handling Traditionally, bits have been sent over line lacking any error correcting scheme in physical layer. The presence of the CPU in each modem makes it po

Create a new user-data control, Create a new user : CREATE USER IDENTI...

Create a new user : CREATE USER IDENTIFIED BY Example: //CREATE USER MCA12 IDENTIFIED BY W123 Grant: It is used to give database access permission to users. It is of

Explain how you can define an object model of a system, Explain how you can...

Explain how you can define an object model of a system. A list of terms that shall be used by end users to describe state and behaviour of objects in system.   Different use

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd