subject

Discuss the different types of transaction failures. What is meant by catastrophic failure? 23.2. Discuss the actions taken by the read_item and write_item operations on a database. 23.3. What is the system log used for? What are the typical kinds of entries in a system log? What are checkpoints, and why are they important? What are transaction commit points, and why are they important? 23.4. How are buffering and caching techniques used by the recovery subsystem? 23.5. What are the before image (BFIM) and after image (AFIM) of a data item? What is the difference between in-place updating and shadowing, with respect to their handling of BFIM and AFIM? 23.6. What are UNDO-type and REDO-type log entries? 23.7. Describe the write-ahead logging protocol. 23.8. Identify three typical lists of transactions that are maintained by the recovery subsystem. 23.9. What is meant by transaction rollback? What is meant by cascading rollback? Why do practical recovery methods use protocols that do not permit cascading rollback? Which recovery techniques do not require any rollback? 23.10. Discuss the UNDO and REDO operations and the recovery techniques that use each. 23.11. Discuss the deferred update technique of recovery. What are the advantages and disadvantages of this technique? Why is it called the NO-UNDO/REDO method? 23.12. How can recovery handle transaction operations that do not affect the database, such as the printing of reports by a transaction? 23.13. Discuss the immediate update recovery technique in both single-user and multiuser environments. What are the advantages and disadvantages of immediate update? 23.14. What is the difference between the UNDO/REDO and the UNDO/NO-REDO algorithms for recovery with immediate update? Develop the outline for an UNDO/NO-REDO algorithm. 23.15. Describe the shadow paging recovery technique. Under what circumstances does it not require a log? 23.16. Describe the three phases of the ARIES recovery method. 23.17. What are log sequence numbers (LSNs) in ARIES? How are they used? What information do the Dirty Page Table and Transaction Table contain? Describe how fuzzy checkpointing is used in ARIES.​

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 19:30
Can you make money in why are you guys so
Answers: 1
question
Computers and Technology, 23.06.2019 11:00
What are the possible consequences of computer hacking? what is computer piracy? describe some examples. what are the effects of computer piracy? what are the possible consequences of computer piracy? what is intentional virus setting? describe some examples. what are the effects of intentional virus setting? what are the possible consequences of intentional virus setting? what is invasion of privacy? describe some examples. what are the effects of invasion of privacy? what are the possible consequences of invasion of privacy? what is an acceptable use policy and what is the purpose of the acceptable use policy what is intellectual property and how can you use it?
Answers: 1
question
Computers and Technology, 23.06.2019 18:30
The computers in the sales department did not have enough data storage capacity to contain all the information the department needed to store, and it was taking a long time for team members to access the data they needed. to fix the problem, the technician installed new, larger hard drives on all the computers.
Answers: 1
question
Computers and Technology, 24.06.2019 00:40
What social factors affect your health
Answers: 3
You know the right answer?
Discuss the different types of transaction failures. What is meant by catastrophic failure? 23.2. Di...
Questions
question
Mathematics, 10.03.2020 05:18
question
Mathematics, 10.03.2020 05:18
question
Mathematics, 10.03.2020 05:19
Questions on the website: 13722367