Software failures-database recovery and security, Database Management System

Assignment Help:

Software failures:  In such cases, a software error abruptly stops the implementation of the current transaction (or all transactions), therefore leading to losing the state of program implementation and the contents / state of the buffers.  But what is a buffer? A buffer is the portion of RAM that kept the partial contents of database that is currently needed by the transaction. The software failures can further be subdivided as:

a)   Application or Statement program failure

b)   DBMS software failure

c)   Failure due to viruses

d)   Operating system failure

A Statement of program may cause abnormal termination if it does not implement totally.  This happens if during the implementation of a statement, an integrity constraint gets desecrated. This leads to irregular termination of the transaction because of which any prior updates made by the transaction may still get reflected in the database going it in an inconsistent state.

A failure of transaction can happen if some code in a transaction program leads to its abnormal termination. For instance, a transaction can go into an infinite loop.

In such a case the only technique to break the loop is to abort the program.  Likewise, the failure can be traced to the DBMS or operating system and transactions are aborted abruptly. Therefore part of the transaction that was implemented before abort may cause some updates in database, and therefore the database is updated only partially which leads to an inconsistent state of database.


Related Discussions:- Software failures-database recovery and security

Difference between a composite key and attribute, Question: (a) Discuss...

Question: (a) Discuss the difference between a composite key and a composite attribute. How would each be indicated in an E-R diagram? Support your answer with appropriate exam

Explain hashing techniques, Explain Hashing techniques The hashing tech...

Explain Hashing techniques The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with

DBMS, You are managing the following database system: • DBMS: Oracle 11g...

You are managing the following database system: • DBMS: Oracle 11g • OS: Sun Solaris • System architecture: Web-based application using ASP.Net • Purpose of Server: HR manage

Data mining, 1.Why we need data mining? Give an example to illustrate your ...

1.Why we need data mining? Give an example to illustrate your answer. 2. Why data mining is considered as "misleading name"? 3. Distinguish the difference between database an

Which steps must designer take to adjust inheritance, In object oriented de...

In object oriented design, which steps must designer take to adjust inheritance? To readjust inheritance following steps should be taken: i)  Rearrange and adjust the classe

Task partitioning, Task Partitioning, Sequencing and Project Planning T...

Task Partitioning, Sequencing and Project Planning The tasks required for the service might be broadly partitioned into: 0.      Set up database tables and account file

A b-tree of order how much children m has maximum, A B-tree of order how mu...

A B-tree of order how much children m has maximum ? m has maximum m mchildren in a B tree.

MIS, We face problem of stock Opening balance and closing balance in Minus...

We face problem of stock Opening balance and closing balance in Minus

Why we use delegation to share implementation, Use Delegation to Share Impl...

Use Delegation to Share Implementation The delegation " Delegation comprises of catching an operation on one object and sending it to other object which is part, or related to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd