Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the Log Based Recovery Method?
The system log that is generally written on stable storage consists of the redundant data required to recover from volatile storage failures and as well from errors discovered by the transaction or the database system. System log is as well known as log and has sometimes been known as the DBMS journal. In case of system crash the log is processed from the starting to the point where system crashes. Every transaction, those have been recorded their-of-transaction marker, will be committed if not rolled back. The simplicity and very easy to use the main benefits of this method.
The drawback are:
(A) Inefficient for the application, which have large volume of information,
(b) In case of system crash along with loss of volatile information, the log information collected in buffers will as well be lost and transaction that had been completed for some period prior to the system crash might be missing their relevant end-of-transaction markers in the log; if such transactions are rolled back then similarly to be partially undone.
The H. I. Topi School of Business operates international business programs in 10 locations throughout Europe. The school had its first class of graduates in 1965. The school keep
education.
What is the use of group by clause? Group by clause is used to be relevant aggregate functions to a set of tuples. The attributes given in the group by clause are used to shape
What is meant by buffer blocks and disk buffer The blocks residing temporarily in main memory are referred to as buffer blocks. The area of memory where blocks reside t
Explain what is Aggregation? Aggregation: Aggregation is an significant concept in database design whereas composite objects could be modelled during the design of database a
List the internal controls that should be in effect solely because a EDP system is employed, classifing them as (1) Those controls pertaining to input of information and (2) All ot
Define Physical and Logical independence Ans: Physical data independence: The ability to modify physical level without causing application program to be rewritten. Logic
What is completeness constraint on generalization? Define the variation between total and partial design constraint. Give an example each. Ans: Completeness Constraints
Speedup Query Processing: A query that includes data at various sites can be split into sub-queries. These sub- queries can be implemented in parallel by various sites. Such parall
Explain the terms primary key, candidate key, alternate key and secondary key. In the given table identify every key? STUDENT(SID,Regno, Name, City) Primary Key: The prim
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd