adplus-dvertising
frame-decoration

Question

The log is a sequence of ___________, recording all the update activities in the database.

a.

Log records

b.

Records

c.

Entries

d.

Redo

Posted under Recovery System DBMS

Answer: (a).Log records

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The log is a sequence of ___________, recording all the update activities in the database.

Similar Questions

Discover Related MCQs

Q. In the ___________ scheme, a transaction that wants to update the database first creates a complete copy of the database.

Q. The ____________ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.

Q. The current copy of the database is identified by a pointer, called _____________, which is stored on disk.

Q. If a transaction does not modify the database until it has committed, it is said to use the ___________ technique.

Q. If database modifications occur while the transaction is still active, the transaction is said to use the ___________technique.

Q. ____________ using a log record sets the data item specified in the log record to the old value.

Q. In the __________ phase, the system replays updates of all transactions by scanning the log forward from the last checkpoint.

Q. The actions which are played in the order while recording it is called ______________ history.

Q. A special redo-only log record is written to the log, where V1 is the value being restored to data item Xj during the rollback. These log records are sometimes called

Q. Which of the following is not a recovery technique?

Q. Checkpoints are a part of

Q. ....... deals with soft errors, such as power failures.

Q. Rollback of transactions is normally used to :

Q. A transaction performs on the isolation level of the Read Uncommitted if :

Q. Which commands are used to control which users have which privilege over which objects ?

Q. When a deadlock is detected the recovery is normally accomplished by :

Q. Which is not a desirable property of a transaction ?

Q. A directed graph which represents the deadlock is called :

Q. Transaction Throughput is :

Q. Data encryption techniques are particularly useful for