Database Recovery, Distribution, and Access Control
Classified in Language
Written on in English with a size of 619.47 KB
Database Recovery Methods
Database recovery is achieved by performing a combination of methods.
Checkpointing Process:
One of the following is not a step in the checkpointing process.
None of the above
RDU Algorithm:
In the algorithm RDU (Recovery using Deferred Update), only REDO is needed.
Database Privileges
One of the following privileges is an example of a privilege granted at the account level.
CREATE TABLE
One of the following privileges is attribute specific.
UPDATE
Role-Based Access Control (RBAC)
Role-based access control (RBAC) is used by the majority of enterprises with more than 500 employees.
Redoing and Undoing Transactions
Redoing and Undoing transactions are required in RIU
Disadvantages of Distributed Data
Disadvantage of Distributed data... Continue reading "Database Recovery, Distribution, and Access Control" »