Chapter 19: Problem 27
What implications would a no-steal/force buffer management policy have on checkpointing and recovery?
Chapter 19: Problem 27
What implications would a no-steal/force buffer management policy have on checkpointing and recovery?
All the tools & learning materials you need for study success - in one app.
Get started for freeDiscuss the different types of transaction failures. What is meant by catastrophic failure?
Choose the correct answer for each of the following multiple-choice questions:Incremental logging with deferred updates implies that the recovery system must necessarily a. store the old value of the updated item in the log. b. store the new value of the updated item in the log. c. store both the old and new value of the updated item in the log. d. store only the Begin Transaction and Commit Transaction records in the log.
Choose the correct answer for each of the following multiple-choice questions: When a failure occurs, the log is consulted and each operation is either undone or redone. This is a problem because a. searching the entire log is time consuming. b. many redo's are unnecessary. c. both (a) and (b). d. none of the above.
Choose the correct answer for each of the following multiple-choice questions: The write ahead logging (WAL) protocol simply means that a. the writing of a data item should be done ahead of any logging operation. b. the log record for an operation should be written before the actual data is written. c. all log records should be written before a new transaction begins execution. d. the log never needs to be written to disk.
What are log sequence numbers (LSNs) in ARIES? How are they used? What information does the Dirty Page Table and Transaction Table contain? Describe how fuzzy checkpointing is used in ARIES.
What do you think about this solution?
We value your feedback to improve our textbook solutions.