adplus-dvertising
frame-decoration

Question

The ____________ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.

a.

Shadow copy

b.

Shadow Paging

c.

Update log records

d.

All of the mentioned

Posted under Recovery System DBMS

Answer: (b).Shadow Paging

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The ____________ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.

Similar Questions

Discover Related MCQs

Q. The current copy of the database is identified by a pointer, called _____________, which is stored on disk.

Q. If a transaction does not modify the database until it has committed, it is said to use the ___________ technique.

Q. If database modifications occur while the transaction is still active, the transaction is said to use the ___________technique.

Q. ____________ using a log record sets the data item specified in the log record to the old value.

Q. In the __________ phase, the system replays updates of all transactions by scanning the log forward from the last checkpoint.

Q. The actions which are played in the order while recording it is called ______________ history.

Q. A special redo-only log record is written to the log, where V1 is the value being restored to data item Xj during the rollback. These log records are sometimes called

Q. Which of the following is not a recovery technique?

Q. Checkpoints are a part of

Q. ....... deals with soft errors, such as power failures.

Q. Rollback of transactions is normally used to :

Q. A transaction performs on the isolation level of the Read Uncommitted if :

Q. Which commands are used to control which users have which privilege over which objects ?

Q. When a deadlock is detected the recovery is normally accomplished by :

Q. Which is not a desirable property of a transaction ?

Q. A directed graph which represents the deadlock is called :

Q. Transaction Throughput is :

Q. Data encryption techniques are particularly useful for

Q. Before any changes to database structure are attempted one should first:

Q. Which of the following modifications may not succeed?