Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the Log Based Recovery Method?
The system log that is generally written on stable storage consists of the redundant data required to recover from volatile storage failures and as well from errors discovered by the transaction or the database system. System log is as well known as log and has sometimes been known as the DBMS journal. In case of system crash the log is processed from the starting to the point where system crashes. Every transaction, those have been recorded their-of-transaction marker, will be committed if not rolled back. The simplicity and very easy to use the main benefits of this method.
The drawback are:
(A) Inefficient for the application, which have large volume of information,
(b) In case of system crash along with loss of volatile information, the log information collected in buffers will as well be lost and transaction that had been completed for some period prior to the system crash might be missing their relevant end-of-transaction markers in the log; if such transactions are rolled back then similarly to be partially undone.
Selective replication: This is a combination of generating small fragments of relation and replicating them rather than a entire relation. The data should be fragmented on require
Using a labelled diagram explain the operation of the Data Warehouse, define the basic architectural components and outline the main functionalities. Briefly explain the role an op
What is called as recursive partitioning? The system repeats the splitting of the input unless each partition of the build input fits in the memory. Such partitioning is known
a. Construct a query around any one of the functional divisions you made in 4a such that if executed in the distributed design of 4 would require reconstruction of at least two ho
What are the uses of functional dependencies? To test relations to see whether they are legal under a given set of functional dependencies. To state constraints on the set
I need help with some assignments
What is meant by heuristic optimisation?Discuss the major heuristics that are applied during query optimisation.
Describe the algorithm for updating indices for a single level index when a record is (i) Inserted (ii) deleted What will be the modification if there are multilevel in
What are the kinds of Strings? -A binary string in MySQL is one that MySQL treats as case sensitive in comparisons. -A non binary string in MySQL is one that MySQL does'nt
I have a small project that contains 3 deliverable s. I have done the first one and I would like you to help me with second one
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd