in Education by
During recovery from a failure (a) each pair of physical block is examined (b) specified pair of physical block is examined (c) first pair of physical block is examined (d) none of the mentioned This question was addressed to me in an online interview. Query is from Tertiary Storage in chapter Storage and File Structures of Database Management Select the correct answer from above options Interview Questions and Answers, Database Interview Questions and Answers for Freshers and Experience

1 Answer

0 votes
by
The correct choice is (a) each pair of physical block is examined For explanation: Tertiary storage involves a robotic mechanism which will mount (insert) and dismount removable mass storage media into a storage device according to the system’s demands; this data is often copied to secondary storage before use.

Related questions

0 votes
    Which kind of failure loses its data in head crash or failure during a transfer operation. (a) ... , Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    The failure occurred sufficiently early during the transfer that the destination block remains intact. (a) ... topic in portion Recovery System of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    The researcher's failure to protect research subjects from deductive disclosure is the primary ethical violation in which of the following studies?...
asked Mar 1, 2021 in Education by Editorial Staff
0 votes
    I need to know of any way to access a running instance in Amazon EC2. I DON'T have the original keypair ". ... or assign a new keypair? Select the correct answer from above options...
asked Feb 8, 2022 in Education by JackTerrance
0 votes
    I need to know of any way to access a running instance in Amazon EC2. I DON'T have the original keypair ". ... or assign a new keypair? Select the correct answer from above options...
asked Feb 5, 2022 in Education by JackTerrance
0 votes
    ________ is a password recovery and auditing tool. (a) LC3 (b) LC4 (c) Network Stumbler (d) Maltego I had ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which are types of recovery control techniques: (a) Deferred update (b) Immediate update (c) All of ... , Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    The recovery scheme must also provide (a) High availability (b) Low availability (c) High reliability ( ... Classification topic in portion Recovery System of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    How many types of recovery control techniques: (a) 2 (b) 3 (c) 4 (d) 5 This question was ... is from Querying database part 5 in chapter Transactions of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    Which of the following are introduced to reduce the overheads caused by the log-based recovery? (a) ... Based Protocols topic in portion Concurrency Control of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    Explain about the term waste heat recovery?...
asked Jan 30, 2021 in Education by JackTerrance
0 votes
    The following script both demonstrates and documents (in the header comment) the issue, namely that I am unable to ... any difference between the "expected" and "actual" strings:...
asked Feb 11, 2022 in Education by JackTerrance
0 votes
    I want my database to communicate with my java programs Can anyone provide me with a sample program using JDBC? I'm ... ?"); } } Select the correct answer from above options...
asked Jan 21, 2022 in Education by JackTerrance
0 votes
    Consider 5 independent Bernoulli.s trials each with probability of success p. If the probability of at least one failure ... 11 12 ,1] Select the correct answer from above options...
asked Nov 16, 2021 in Education by JackTerrance
...