adplus-dvertising
frame-decoration

Question

The assumption that hardware errors and bugs in the software bring the system to a halt, but do not corrupt the nonvolatile storage contents, is known as the

a.

Stop assumption

b.

Fail assumption

c.

Halt assumption

d.

Fail-stop assumption

Posted under DBMS

Answer: (d).Fail-stop assumption

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The assumption that hardware errors and bugs in the software bring the system to a halt, but do not corrupt the nonvolatile storage contents, is known as the

Similar Questions

Discover Related MCQs

Q. The transaction can no longer continue with its normal execution because of some internal condition, such as bad input, data not found, overflow, or resource limit exceeded. This is

Q. The system has entered an undesirable state (for example, deadlock), as a result of which a transaction cannot continue with its normal execution. This is

Q. Which of the following belongs to transaction failure

Q. Which one of the following is a failure to system

Q. The recovery scheme must also provide

Q. Instead of locking index leaf nodes in a two-phase manner, some index concurrency-control schemes use ___________ on individual key values, allowing other key values to be inserted or deleted from the same leaf.

Q. B-link tree requires a pointer to its __________ sibling.

Q. In crabbing protocol to inset or delete a key value the leaf node has to be locked in ___________ mode.

Q. If needed to split a node or coalesce it with its siblings, or redistribute key values between siblings, the crabbing protocol locks the parent of the node in ____________ mode.

Q. In crabbing protocol the the lock obtained on the root node is in _________ mode.

Q. The deadlock can be handled by

Q. In crabbing protocol locking

Q. How many techniques are available to control concurrency on B+ trees?

Q. Why do we need concurrency control on B+ trees ?

Q. The method of access that uses key transformation is called as

Q. Evaluate the following CREATE SEQUENCE statement:

CREATE SEQUENCE seq1
START WITH 100
INCREMENT BY 10
MAXVALUE 200
CYCLE
NOCACHE;

The sequence SEQ1 has generated numbers up to the maximum limit of 200. You issue the following SQL statement:

SELECT seq1.nextval FROM dual;

What is displayed by the SELECT statement?

Q. Evaluate the CREATE TABLE statement:

CREATE TABLE products
(product_id NUMBER(6) CONSTRAINT prod_id_pk PRIMARY KEY, product_name VARCHAR2(15));

Which statement is true regarding the PROD_ID_PK constraint?

Q. An application developer can guard against certain snapshot anomalies by appending a ______ clause to the SQL select query.

Q. Each of a pair of transactions has read data that is written by the other, but there is no data written by both transactions, is referred to as

Q. When a transaction Ti attempts to update a data item, it requests a _________ on that data item.