in Education by
In the __________ phase, the system replays updates of all transactions by scanning the log forward from the last checkpoint. (a) Repeating (b) Redo (c) Replay (d) Undo This question was posed to me in a job interview. My question comes from Recovery in chapter Recovery System of Database Management

1 Answer

0 votes
by
Right choice is (b) Redo The explanation is: Undo brings the previous contents.

Related questions

0 votes
    A consistency model used in distributed computing to achievehigh availability that informally guarantees that, if no ... )A Strong Consistency model (2)Eventually Consistent model...
asked Apr 21, 2021 in Technology by JackTerrance
0 votes
    All lock information is managed by a __________ which is responsible for assigning and policing the locks ... Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    __________ is the last phase of ethical hacking process. (a) Scanning (b) Tracks clearing (c) Reconnaissance (d) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Under first updater wins the system uses a __________ mechanism that applies only to updates. (a) ... Snapshot Isolation in chapter Concurrency Control of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    The ___________ policy, allows the system to write modified blocks to disk even if the transactions that ... Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
0 votes
    Which of the following comes after scanning phase in ethical hacking? (a) Scanning (b) Maintaining access (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Locks on buffer blocks are unrelated to locks used for concurrency-control of transactions, and releasing ... Management topic in portion Recovery System of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    In __________ phase the hacker exploits the network or system vulnerabilities. (a) Scanning (b) Maintaining access (c) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Consistency of CAP theorem states that all the protocols must be satisfied by the transaction. There can be half-completed transactions. (1)False (2)True...
asked Apr 22, 2021 in Technology by JackTerrance
0 votes
    Consistency of CAP theorem states that all the protocols must be satisfied by the transaction. There can be half-completed transactions....
asked Oct 11, 2020 in Education by anonymous
0 votes
0 votes
    The database system must take special actions to ensure that transactions operate properly without interference ... Concept topic in chapter Transactions of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
...