Describe how these functions would be essential for business

Assignment Help Computer Engineering
Reference no: EM133231841

Assignment - Computer Science Database Discussion

Description - There are times when a database is accessed by many users across the enterprise. Transaction logs can help maintain concurrency in a multiuser platform.

Describe at least two business scenarios where "commit" and "rollback" would be required.

Describe how these functions would be essential for business continuity and concurrency control.

Identify how these functions would enable an organization to recover from a database corruption event.

Be sure to respond to at least one of your classmates' posts.

Please respond to student's comment below -

A commit and rollback scenario become necessary when you are looking to make permanent changes to a database that can only be reversed through rollback or through processing another transaction in reverse. An example of needing the commit in a business case is when you are looking to make a delete post with cascading impacts. You want to ensure the tables are confirmed. An example of a rollback would be if the transaction was mid stream and the system was disconnected. This failure would cause the transaction to be aborted and returned the the previously state without changes from the transaction.

These transactions are important for a system to allow concurrency controls where multiple users are able to access read and write activity to a table. Without them, the database would need to lock out multiple users from accessing it, which could slow down availability to users or cause transactions to fail due to deadlocking.

Without the ability to rollback, the company would need to apply partial reversal transactions, or upload backups more frequently. This would also mean that they would need to recreate the activity that was intended since the last update was stored. That would likely mean a lot of downtime and coordination to get databases back online. Similarly, if data was corrupted, having the ability to rollback the transaction would prevent the need to go back to the tapes and upload stored backups.

Reference no: EM133231841

Questions Cloud

Addressing community about an increase : Imagine that you are a law enforcement officer tasked with addressing your community about an increase in a type of crime.
What are the pros and cons of lobbyists : POLI 330N Chamberlain University College of Nursing, What are the pros and cons of lobbyists as a tool for special interest groups? should former members
The travel industry is becoming more globalized : The travel industry is becoming more globalized. Give 4 reasons for this phenomenon and explain each of your examples.
Is it feasible in the political environment : POS 1041 Keiser University, stipulated measures of semi-direct democracy: the popular initiative. Does it exist in the state or territory where you currently
Describe how these functions would be essential for business : Computer Science Database Discussion - Describe how these functions would be essential for business continuity and concurrency control
Calculate equilibrium market price-quantity of us dollars : Suppose that you are managing the forex bureau of a bank that faces a perfectly competitive market comprising of 18 identical commercial banks.
Current product-liability legal system : How does product liability impact business operations and decisions? Do you believe that the current product-liability legal system is broken?
What has pandemic taught us : POLSC 10 Long Beach City College, What has pandemic/lockdown taught us about our constitutional system of government, and the nature of the American people
Who are the principals in the carjacking : 1. Alan, Bob, Chris, and Derek carjack a vehicle and take the female driver to a secluded location where Bob and Chris rape the victim. The victim can identify

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss organizations share information about authentication

An IDS shows a large number of legitimate users attempting to access a system but who are getting denied

  Which wireless lan technology would you recommend

Which wireless LAN technology would you recommend? Where would you place the access points? Where would you place the wired backbone?

  The wbfk transport company operates throughout mainland

the wbfk transport company operates throughout mainland australia. the company specialize in fast delivery of

  Discuss the considerations in interfacing digital systems

COMPUTER INTERFACING-Explain the relevance of computer interfacing in computer engineering;Discuss the considerations in interfacing digital systems.

  What could be done to minimize their impact on the system

Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system

  Build a model using r or python software

Build a model Using R or Python software by applying Dirichlet mixture model for detecting spammers in Instagram dataset - How to collect the data, you want to search from the Internet or you want to collect it by yourself.

  What is important about the given different frequencies

At what frequency ranges do the IEEE 802.11 b/alg/n/ac standards transmit? What is important about these different frequencies?

  Factors for building a server room

Explain the factors you must consider for each of the following given topics: Walls and doors, Access control

  Explain the advantages of each type of testing

300 Words: Discuss the advantages and disadvantages of each type of testing. When is each type of testing appropriate? Are there situations that preclude.

  What is a real-world example of how an application developed

What is a real-world example of how an application developed for a uniprocessor can impact the performance of executing the same application on a multiprocessor

  Important activities in it acquisition planning

important activities in IT acquisition planning is identifying alternative solutions

  Name four authentication policies which can be enforced by

name four authentication policies that can be enforced using technology and four authentication policies that cannot be

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd