subject

Discuss the different types of transaction failures. What is meant by catastrophic failure? 23.2. Discuss the actions taken by the read_item and write_item operations on a database. 23.3. What is the system log used for? What are the typical kinds of entries in a system log? What are checkpoints, and why are they important? What are transaction commit points, and why are they important? 23.4. How are buffering and caching techniques used by the recovery subsystem? 23.5. What are the before image (BFIM) and after image (AFIM) of a data item? What is the difference between in-place updating and shadowing, with respect to their handling of BFIM and AFIM? 23.6. What are UNDO-type and REDO-type log entries? 23.7. Describe the write-ahead logging protocol. 23.8. Identify three typical lists of transactions that are maintained by the recovery subsystem. 23.9. What is meant by transaction rollback? What is meant by cascading rollback? Why do practical recovery methods use protocols that do not permit cascading rollback? Which recovery techniques do not require any rollback? 23.10. Discuss the UNDO and REDO operations and the recovery techniques that use each. 23.11. Discuss the deferred update technique of recovery. What are the advantages and disadvantages of this technique? Why is it called the NO-UNDO/REDO method? 23.12. How can recovery handle transaction operations that do not affect the database, such as the printing of reports by a transaction? 23.13. Discuss the immediate update recovery technique in both single-user and multiuser environments. What are the advantages and disadvantages of immediate update? 23.14. What is the difference between the UNDO/REDO and the UNDO/NO-REDO algorithms for recovery with immediate update? Develop the outline for an UNDO/NO-REDO algorithm. 23.15. Describe the shadow paging recovery technique. Under what circumstances does it not require a log? 23.16. Describe the three phases of the ARIES recovery method. 23.17. What are log sequence numbers (LSNs) in ARIES? How are they used? What information do the Dirty Page Table and Transaction Table contain? Describe how fuzzy checkpointing is used in ARIES.​

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 19:00
The fourth generation of computers emerged between 1970s and 1980s. which technological advancement brought about this generation of computers? which computer architecture was used most in this generation?
Answers: 3
question
Computers and Technology, 23.06.2019 09:00
Which best compares appointments and events in outlook 2010appointments have a subject man, and events do notappointments have a specific date or range of dates, and events do notappointments have a start and end time of day, and events do notappointments have a location option, and events do not
Answers: 2
question
Computers and Technology, 23.06.2019 15:20
What does a bonus object do? a. subtracts lives b. keeps track of a player's health c. gives a player an advantage d. makes text appear
Answers: 1
question
Computers and Technology, 23.06.2019 21:20
In microsoft word, when you highlight existing text you want to replace, you're in              a.  advanced mode.    b.  automatic mode.    c.  basic mode.    d.  typeover mode
Answers: 1
You know the right answer?
Discuss the different types of transaction failures. What is meant by catastrophic failure? 23.2. Di...
Questions
question
Mathematics, 07.12.2020 01:00
question
Mathematics, 07.12.2020 01:00
question
Chemistry, 07.12.2020 01:00
question
Biology, 07.12.2020 01:00
question
Mathematics, 07.12.2020 01:00
Questions on the website: 13722363