DBMS-DATABASE RECOVERY SYSTEMS
DBMS-DATABASE RECOVERY SYSTEMS
31. When using a transaction log based recovery scheme, it might improve performance as well as providing a recovery mechanism by
- writing the appropriate log records to disk during the transaction's execution
- writing the log records to dick when each transaction commits
- never writing the log records to disk.
- waiting to write the log records until multiple transactions commit and writting them as a batch.
32. Which of the following is an example of a NO-UNDO/REDO algorithm /
- Shadow paging
- Immediate update
- Deferred update
- None of these
33. Which of the following is an example of a UNDO/REDO algorithm ?
- Shadow paging
- Immediate update
- Deferrd update
- None of these
34. If the shadowing approach is used for flushing a data item back to disk, then the item is written to
- the same disk location from which it was read.
- disk before the transaction commits.
- disk only after the transaction commits.
- a different location on disk.
35. If the shadowing approach is used for flushing a data item back to disk, then the item is written to
- the same disk location form which it was read.
- disk before the trasaction commits
- disk only after the transaction commits.
- a different location on disk.
37. Shadow paging technique maintains
- two page tables
- three page tables
- four page tables
- five page tables
38. The checkpoint technique is used to limit
- the volume of log information.
- amount of searching
- subsequent processing that is needed to carry out on the transaction log file.
- All of these
39. Which of the following recovery technique does not need log ?
- Shadow paging
- Immediate update
- Deferred update
- None of these
40. The failure may be the result of
- a system crash due to hardware or software erors
- a media failure such as head crash
- a software error in the application such as a logical error in the program that is accessing the database
- All of these.