Describe the ways in which these problems can be resolved

Assignment Help Computer Engineering
Reference no: EM133238434

MySQL Backup

Steve has been working in the IT department of Rapid Falls Regional Shuttle Service for nearly three years. He has always backed up the MySQL database manually after close of business each day. Initially, this could be done in less than 30 minutes. However, the company has grown steadily and taking a backup now requires nearly 2 hours. Steve never gets home before 8:00 P.M. Of late, the availability of free disk-space has also become an issue.

  1. Describe the ways in which these problems can be resolved.
  2. Discuss the relative costs of the available alternatives.
  3. List the criteria Steve should use to choose a solution for the backup problem.

As the database administrator for Rapid Falls Regional Shuttle, you recognize the need to reduce the time required to back up the MySQL database of the organization. Your plan is to experiment with the methods available and determine which method takes the least time. You start by:

  1. Creating a database based on the specifications provided by your facilitator.
  2. Identifying the steps required for the available backup alternatives. Use the alternatives discussed in the course. Each experiment will then be conducted as follows:
  3. Record the start time by taking a screen shot of the system clock of the server.
  4. Execute the backup process.
  5. Take a screen shot of the backup result.
  6. Record the finish time by taking the screen shot of the system clock of the server.

When you capture the screen shots of the system clock of the server, be sure the seconds are displayed. In addition, you may need to use the INSERT and SELECT statement to generate enough data to have a measurable difference in the backup times.

According to the Rapid Falls Regional Shuttle backup and recovery requirements, the system should be backed up regularly. Recovery procedures should also be documented for use when data needs to be recovered. List the steps for making a full backup. Then document the steps for performing a full recovery. Although making a backup prior to recovery can consume valuable time, it may be needed if the recovery fails. Include the screen shots for each step in the procedures.

Review the full backup and recovery procedures submitted by at least two of your classmates. In your review, consider the following parameters:

  1. Are the steps clear and unambiguous?
  2. Are the steps generic or specific to a particular installation?
  3. Are there any missing or redundant steps?
  4. Are the steps sequenced correctly?

Reference no: EM133238434

Questions Cloud

What is the difference of low and remote inclusion : What is the difference of low and remote inclusion? What methods can me employed to prevent a security breach
Why are softskills important to your success : ITCC 200 American Public University - Why are softskills important to your success as an information technology practitioner?
Define any symbols you use in your proof : CS 203 Yuan Ze University - Define any symbols you use in your proof and the two convolution-pooling layers will be equivalent to only one convolution pooling
What concepts concerning engagement in global business : What concepts concerning engagement in global business were of interest to you in this conversation? How does the content shared in this video by Dr. Bezjian
Describe the ways in which these problems can be resolved : DATABASE 123 University of South Florida Describe the ways in which these problems can be resolved and List the criteria Steve should use to choose a solution
Define a standardized health care data set : Define a standardized health care data set. What are the data sets used for, and how do the data sets impact interoperability among health institutions
What are the policies or guidelines should be developed : In order to make decision, whom are you going seek assistance from? What are the guidance and documents are you going to collect in this process
Discuss the importance of diagnosis in the od process : Description - Discuss some of the issues organizations face when entering or contracting for OD process. Discuss the importance of diagnosis in the OD process
How would you analyze the packet analysis of security : ITT 425 Grand Canyon University, How would you analyze the packet analysis of security protocols that affect transactions and gateway protocols

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd