EBK MODERN DATABASE MANAGEMENT,
13th Edition
ISBN: 9780134792279
Author: TOPI
Publisher: YUZU
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 8.70PAE
Program Plan Intro
Decision of the most appropriate recovery techniques for the given situations.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What is the primary difference between keeping hashed passwords in a file and keeping encrypted passwords in a database on a computer?
Distinguish between differential and incremental backups, with a focus on database backups and restores, as well as their dependability (do they always work?).
Five recovery techniques are listed below. For each situation described, decide which of the following recovery techniques is most appropriate. • Backward recovery. • Forward recovery (from latest checkpoint). • Forward recovery (using backup copy of database). • Reprocessing transactions. • Switch. a. A network failure occurs while a user is entering a transaction. b. A d isk drive fails during regular operations. c. A lightning storm causes a power failure. d. An incorrect amount is entered and posted for a stud ent tuition payment. The error is not discovered for several weeks. e. Data entry clerks have entered transactions for two hours after a full database backup when the database becomes corrupted. It is discovered that the journalizing facility of the databas
Chapter 8 Solutions
EBK MODERN DATABASE MANAGEMENT,
Ch. 8 - Prob. 8.1RQCh. 8 - Prob. 8.2RQCh. 8 - Prob. 8.3RQCh. 8 - Prob. 8.4RQCh. 8 - Prob. 8.5RQCh. 8 - Prob. 8.6RQCh. 8 - Prob. 8.7RQCh. 8 - Prob. 8.8RQCh. 8 - Explain why you sometimes have to reserve much...Ch. 8 - Why are field values sometimes coded?
Ch. 8 - Prob. 8.11RQCh. 8 - Prob. 8.12RQCh. 8 - Explain why normalized relations may not comprise...Ch. 8 - Prob. 8.14RQCh. 8 - List three common situations that suggest that...Ch. 8 - Explain the reasons why some experts are against...Ch. 8 - Prob. 8.17RQCh. 8 - Prob. 8.18RQCh. 8 - Prob. 8.19RQCh. 8 - Prob. 8.20RQCh. 8 - Prob. 8.21RQCh. 8 - Prob. 8.22RQCh. 8 - One of the strongest recommendations regarding...Ch. 8 - Explain why an index is useful only if there is...Ch. 8 - Indexing can clearly be very beneficial. Why...Ch. 8 - Prob. 8.26RQCh. 8 - Prob. 8.27RQCh. 8 - Describe the role of data dictionary in the...Ch. 8 - Prob. 8.29RQCh. 8 - Prob. 8.30RQCh. 8 - Explain how creating a view may increase data...Ch. 8 - Prob. 8.32RQCh. 8 - Prob. 8.33RQCh. 8 - Prob. 8.34RQCh. 8 - Prob. 8.35RQCh. 8 - Prob. 8.36RQCh. 8 - Prob. 8.37RQCh. 8 - Prob. 8.38RQCh. 8 - Prob. 8.39RQCh. 8 - How can views be used as part of data security?...Ch. 8 - Prob. 8.41RQCh. 8 - Prob. 8.42RQCh. 8 - Consider the following two relations for...Ch. 8 - Prob. 8.44PAECh. 8 - Prob. 8.45PAECh. 8 - Prob. 8.46PAECh. 8 - Prob. 8.47PAECh. 8 - Suppose you are designing a default value for the...Ch. 8 - When a student has not chosen a major at a...Ch. 8 - Prob. 8.50PAECh. 8 - Prob. 8.51PAECh. 8 - Consider the relations in Problem and Exercise...Ch. 8 - Prob. 8.53PAECh. 8 - Prob. 8.54PAECh. 8 - Prob. 8.55PAECh. 8 - Prob. 8.56PAECh. 8 - Prob. 8.57PAECh. 8 - Consider the relations specified in Problem and...Ch. 8 - Prob. 8.59PAECh. 8 - Prob. 8.60PAECh. 8 - Prob. 8.61PAECh. 8 - Prob. 8.62PAECh. 8 - Prob. 8.63PAECh. 8 - Prob. 8.64PAECh. 8 - Problems and Exercises 8-65 through 8-68 refer to...Ch. 8 - Prob. 8.66PAECh. 8 - Problems and Exercises 8-65i5 through 8-68 refer...Ch. 8 - Refer to Figure 4-5 0. For each of the following...Ch. 8 - Prob. 8.69PAECh. 8 - Prob. 8.70PAECh. 8 - Prob. 8.71PAECh. 8 - Prob. 8.72PAECh. 8 - Prob. 8.73PAECh. 8 - Prob. 8.74PAECh. 8 - Prob. 8.75PAECh. 8 - Prob. 8.76PAECh. 8 - Prob. 8.77PAE
Knowledge Booster
Similar questions
- What is the difference between keeping hashed passwords in a file and using a computer to store an encrypted password database?arrow_forwardBut what's the difference between an encrypted password database and a file where hashed passwords are stored?arrow_forwardWhat's the difference between keeping hashed passwords in a file and having an encrypted password database on a computer?arrow_forward
- Explain the importance of "write-ahead logging" in the context of transaction recovery.arrow_forwardWhy would a hashed file of passwords be preferable than an encrypted database?arrow_forwardIf a password must be stored in a file, why is it better to use hashing instead of encryption?Just what is the function of a password file, and how does one get access to one?arrow_forward
- Learn the differences between database and sequential file backups.arrow_forwardIn today's environment, RAID-capable storage decreases the necessity for Oracle database backups.Because handwriting is more harder to read, written content is favored than scratched information.arrow_forwardWhy is it preferable to have a hashed password file as opposed to an encrypted database?arrow_forward
- Think about the following case: What is the role of a recovery manager in a database system that can't crash, and do you really need one if it never crashes anyway?arrow_forwardIs there a difference between the three backups when it comes to database recovery? What, in a nutshell, is the function of each tier of backups?arrow_forwardWhat distinguishes hashing passwords stored in a file from having an encrypted password database?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education