Modern Database Management
13th Edition
ISBN: 9780134773650
Author: Hoffer
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 8.70PAE
Program Plan Intro
Decision of the most appropriate recovery techniques for the given situations.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Five recovery techniques are listed below. For each situation described, decide which of the following recovery techniques is most appropriate.• Backward recovery• Forward recovery (from latest checkpoint)• Forward recovery (using backup copy of database)• Reprocessing transactions• Switcha) A phone disconnection occurs while a user is entering a transaction.
b.)A disk drive fails during regular operations.
c)A lightning storm causes a power failure.
d)An incorrect amount is entered and posted for a student tuition payment. The error is not discovered for several weeks.
e)Data entry clerks have entered transactions for two hours after a full database backup when the database becomes corrupted. It is discovered that the journalizing facility of the database has not been activated since the backup was made.
Distinguish between differential and incremental backups, with a focus on database backups and restores, as well as their dependability (do they always work?).
Is there a difference between the three backups when it comes to database recovery? What, in a nutshell, is the function of each tier of backups?
Chapter 8 Solutions
Modern Database Management
Ch. 8 - Prob. 8.1RQCh. 8 - Prob. 8.2RQCh. 8 - Prob. 8.3RQCh. 8 - Prob. 8.4RQCh. 8 - Prob. 8.5RQCh. 8 - Prob. 8.6RQCh. 8 - Prob. 8.7RQCh. 8 - Prob. 8.8RQCh. 8 - Explain why you sometimes have to reserve much...Ch. 8 - Why are field values sometimes coded?
Ch. 8 - Prob. 8.11RQCh. 8 - Prob. 8.12RQCh. 8 - Explain why normalized relations may not comprise...Ch. 8 - Prob. 8.14RQCh. 8 - List three common situations that suggest that...Ch. 8 - Explain the reasons why some experts are against...Ch. 8 - Prob. 8.17RQCh. 8 - Prob. 8.18RQCh. 8 - Prob. 8.19RQCh. 8 - Prob. 8.20RQCh. 8 - Prob. 8.21RQCh. 8 - Prob. 8.22RQCh. 8 - One of the strongest recommendations regarding...Ch. 8 - Explain why an index is useful only if there is...Ch. 8 - Indexing can clearly be very beneficial. Why...Ch. 8 - Prob. 8.26RQCh. 8 - Prob. 8.27RQCh. 8 - Describe the role of data dictionary in the...Ch. 8 - Prob. 8.29RQCh. 8 - Prob. 8.30RQCh. 8 - Explain how creating a view may increase data...Ch. 8 - Prob. 8.32RQCh. 8 - Prob. 8.33RQCh. 8 - Prob. 8.34RQCh. 8 - Prob. 8.35RQCh. 8 - Prob. 8.36RQCh. 8 - Prob. 8.37RQCh. 8 - Prob. 8.38RQCh. 8 - Prob. 8.39RQCh. 8 - How can views be used as part of data security?...Ch. 8 - Prob. 8.41RQCh. 8 - Prob. 8.42RQCh. 8 - Consider the following two relations for...Ch. 8 - Prob. 8.44PAECh. 8 - Prob. 8.45PAECh. 8 - Prob. 8.46PAECh. 8 - Prob. 8.47PAECh. 8 - Suppose you are designing a default value for the...Ch. 8 - When a student has not chosen a major at a...Ch. 8 - Prob. 8.50PAECh. 8 - Prob. 8.51PAECh. 8 - Consider the relations in Problem and Exercise...Ch. 8 - Prob. 8.53PAECh. 8 - Prob. 8.54PAECh. 8 - Prob. 8.55PAECh. 8 - Prob. 8.56PAECh. 8 - Prob. 8.57PAECh. 8 - Consider the relations specified in Problem and...Ch. 8 - Prob. 8.59PAECh. 8 - Prob. 8.60PAECh. 8 - Prob. 8.61PAECh. 8 - Prob. 8.62PAECh. 8 - Prob. 8.63PAECh. 8 - Prob. 8.64PAECh. 8 - Problems and Exercises 8-65 through 8-68 refer to...Ch. 8 - Prob. 8.66PAECh. 8 - Problems and Exercises 8-65i5 through 8-68 refer...Ch. 8 - Refer to Figure 4-5 0. For each of the following...Ch. 8 - Prob. 8.69PAECh. 8 - Prob. 8.70PAECh. 8 - Prob. 8.71PAECh. 8 - Prob. 8.72PAECh. 8 - Prob. 8.73PAECh. 8 - Prob. 8.74PAECh. 8 - Prob. 8.75PAECh. 8 - Prob. 8.76PAECh. 8 - Prob. 8.77PAE
Knowledge Booster
Similar questions
- 8. In the __________ phase, the system replays updates of all transactions by scanning the log forward from the last checkpoint. a. Repeating b. Redo c. Replay d. Undoarrow_forwardWhich three backup techniques are available for database recovery? In a nutshell, what is the purpose of each backup level?arrow_forward17. When a deadlock is detected the recovery is normally accomplished by : a. rollback of transaction b. locking of data c. consistency checking d. none of thesearrow_forward
- There are three different backups that may be utilised for database recovery. But what, exactly, is the point of the various levels of backups?arrow_forwardWhat are the three kinds of backups that may be utilized for database recovery? What does each backup level serve, in a nutshell?arrow_forwardWhat are the three kinds of backups that may be utilized for database recovery? What is the objective of each backup level, in a nutshell?arrow_forward
- What are the three different kinds of backups that may be used in database recovery? In a nutshell, what does each backup level accomplish?arrow_forwardWhat are the three types of backups that can be utilised in database recovery? What does each backup level perform in a nutshell?arrow_forwardWhat are the three backup types that can be utilized for database recovery? In brief, what is the purpose of each backup level?arrow_forward
- What are the three different types of backups that may be utilized for the recovery of a database? In a nutshell, what precisely is the purpose of each successive level of backup protection?arrow_forward27. Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally? a. Rollback b. Rollforward c. Switch to duplicate database d. Reprocess transactionsarrow_forwardConsider the following case: Does the failsafe database need a recovery manager, and if so, why?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education