Database Concepts (8th Edition)
8th Edition
ISBN: 9780134601533
Author: David M. Kroenke, David J. Auer, Scott L. Vandenberg, Robert C. Yoder
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 6, Problem 6.42RQ
Program Plan Intro
Database recovery is the process of retrieving the data which was lost during the updating or deletion.
- It prepares the copy of the database and holds the data stored in the table such as save the database.
- It also keeps a log of the transaction changes against the database since the save.
- If some failure occurs, the lost data can be retrieved using one of the two methods
- rollback
- rollforward
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
A Load Balancer can be configured as
Please define the term "hard real-time behaviour" completely
Computer science What is the procedure for assessing an RFP?
Chapter 6 Solutions
Database Concepts (8th Edition)
Ch. 6 - Prob. 6.1RQCh. 6 - Explain how database administration tasks vary...Ch. 6 - Prob. 6.3RQCh. 6 - Prob. 6.4RQCh. 6 - Prob. 6.5RQCh. 6 - Prob. 6.6RQCh. 6 - Prob. 6.8RQCh. 6 - Prob. 6.9RQCh. 6 - Prob. 6.10RQCh. 6 - Prob. 6.11RQ
Ch. 6 - Prob. 6.12RQCh. 6 - Prob. 6.13RQCh. 6 - Prob. 6.14RQCh. 6 - Prob. 6.15RQCh. 6 - Prob. 6.16RQCh. 6 - Prob. 6.17RQCh. 6 - Prob. 6.18RQCh. 6 - Explain the benefits of marking transaction...Ch. 6 - Explain the use of the SQL transaction control...Ch. 6 - Prob. 6.21RQCh. 6 - Describe statement-level consistency.Ch. 6 - Prob. 6.23RQCh. 6 - Prob. 6.24RQCh. 6 - Prob. 6.25RQCh. 6 - Prob. 6.26RQCh. 6 - Prob. 6.27RQCh. 6 - Explain what serializable isolation level is. Give...Ch. 6 - Explain the term cursor.Ch. 6 - Prob. 6.30RQCh. 6 - What is the advantage of using different types of...Ch. 6 - Explain forward-only cursors. Give an example of...Ch. 6 - Explain static cursors. Give an example of their...Ch. 6 - Prob. 6.34RQCh. 6 - Prob. 6.36RQCh. 6 - Prob. 6.37RQCh. 6 - Describe the advantages and disadvantages of...Ch. 6 - Prob. 6.40RQCh. 6 - Prob. 6.41RQCh. 6 - Prob. 6.42RQCh. 6 - Prob. 6.44RQCh. 6 - Prob. 6.45RQCh. 6 - What is the advantage of making frequent...Ch. 6 - Summarize a DBAs responsibilities for managing...Ch. 6 - Prob. 6.48RQCh. 6 - Prob. 6.49RQCh. 6 - Prob. 6.50E
Knowledge Booster
Similar questions
- A hard disk with a transfer rate of 10 M bytes/ second is constantly transferring data to memory using DMA. The processor runs at 600 MHz, and takes 300 and 900 clock cycles to initiate and complete DMA transfer respectively. If the size of the transfer is 20 Kbytes, what is the percentage of processor time consumed for the transfer operation?arrow_forwardMemory leaks may have many different origins, depending on the circumstances.arrow_forwardExplain how anomaly detectors function.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning