subject

Discuss the different types of transaction failures. What is meant by catastrophic failure? 23.2. Discuss the actions taken by the read_item and write_item operations on a database. 23.3. What is the system log used for? What are the typical kinds of entries in a system log? What are checkpoints, and why are they important? What are transaction commit points, and why are they important? 23.4. How are buffering and caching techniques used by the recovery subsystem? 23.5. What are the before image (BFIM) and after image (AFIM) of a data item? What is the difference between in-place updating and shadowing, with respect to their handling of BFIM and AFIM? 23.6. What are UNDO-type and REDO-type log entries? 23.7. Describe the write-ahead logging protocol. 23.8. Identify three typical lists of transactions that are maintained by the recovery subsystem. 23.9. What is meant by transaction rollback? What is meant by cascading rollback? Why do practical recovery methods use protocols that do not permit cascading rollback? Which recovery techniques do not require any rollback? 23.10. Discuss the UNDO and REDO operations and the recovery techniques that use each. 23.11. Discuss the deferred update technique of recovery. What are the advantages and disadvantages of this technique? Why is it called the NO-UNDO/REDO method? 23.12. How can recovery handle transaction operations that do not affect the database, such as the printing of reports by a transaction? 23.13. Discuss the immediate update recovery technique in both single-user and multiuser environments. What are the advantages and disadvantages of immediate update? 23.14. What is the difference between the UNDO/REDO and the UNDO/NO-REDO algorithms for recovery with immediate update? Develop the outline for an UNDO/NO-REDO algorithm. 23.15. Describe the shadow paging recovery technique. Under what circumstances does it not require a log? 23.16. Describe the three phases of the ARIES recovery method. 23.17. What are log sequence numbers (LSNs) in ARIES? How are they used? What information do the Dirty Page Table and Transaction Table contain? Describe how fuzzy checkpointing is used in ARIES.​

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 07:00
Our primary purpouse as electricians is to do wich of the following core concepts? a: install electrical components in a way they can be upgraded b: install electrical equiptment in a way that reduces heat c: install electrical systems in a safe manner d: only b and c
Answers: 1
question
Computers and Technology, 22.06.2019 15:30
When creating a budget, log fixed expenses before income. after income. after savings. at the top.
Answers: 1
question
Computers and Technology, 23.06.2019 13:00
Donnie does not have powerpoint. which method would be best for elana to save and share her presentation as is? a pdf a doc an rtf a ppt
Answers: 3
question
Computers and Technology, 24.06.2019 09:30
Atype of researcher who uses computers to make sense of complex digital data
Answers: 1
You know the right answer?
Discuss the different types of transaction failures. What is meant by catastrophic failure? 23.2. Di...
Questions
Questions on the website: 13722360