Software failures-database recovery and security, Database Management System

Assignment Help:

Software failures:  In such cases, a software error abruptly stops the implementation of the current transaction (or all transactions), therefore leading to losing the state of program implementation and the contents / state of the buffers.  But what is a buffer? A buffer is the portion of RAM that kept the partial contents of database that is currently needed by the transaction. The software failures can further be subdivided as:

a)   Application or Statement program failure

b)   DBMS software failure

c)   Failure due to viruses

d)   Operating system failure

A Statement of program may cause abnormal termination if it does not implement totally.  This happens if during the implementation of a statement, an integrity constraint gets desecrated. This leads to irregular termination of the transaction because of which any prior updates made by the transaction may still get reflected in the database going it in an inconsistent state.

A failure of transaction can happen if some code in a transaction program leads to its abnormal termination. For instance, a transaction can go into an infinite loop.

In such a case the only technique to break the loop is to abort the program.  Likewise, the failure can be traced to the DBMS or operating system and transactions are aborted abruptly. Therefore part of the transaction that was implemented before abort may cause some updates in database, and therefore the database is updated only partially which leads to an inconsistent state of database.


Related Discussions:- Software failures-database recovery and security

What are the objectives of query processing, What are the objectives of que...

What are the objectives of query processing?       Ans: The objectives of query processing is to transform a query written in a high level language into a accurate and efficien

Two phase locking technique, growing phase and shrinking phase are disjoint...

growing phase and shrinking phase are disjoint, why ?

Design and prototype, This assignment is worth 45% of your final grade for ...

This assignment is worth 45% of your final grade for this module.  Marks will be awarded as follows: Prototypes (wireframe and web based prototype) You are expected

Explain hashing techniques, Explain Hashing techniques The hashing tech...

Explain Hashing techniques The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with

Name the various privileges in sql, Name the various privileges in SQL? ...

Name the various privileges in SQL? A) Delete B) Select C) Insert D) Update

What is the used of specifying alias, What is the used of specifying alias?...

What is the used of specifying alias? Specifying alias: is used to rename column or attribute in a table.

Decompose the table - 3nf or bcnf, Decompose the table with the following ...

Decompose the table with the following description and functional dependencies into a set of equivalent tables normalized to 3NF or BCNF. A long-standing international treaty am

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd