edited by
368 views
1 votes
1 votes

Checkpoints are a part of

  1. Recovery measures
  2. Security measures
  3. Concurrency measures
  4. Authorization measures
edited by

1 Answer

0 votes
0 votes

(A) Recovery measures

Checkpoints are used in log-based recovery method. Checkpoints are inserted into the log whenever an output to storage is performed. i.e. the database has been updated until this point to the permanent storage. The transactions that were committed before this checkpoint need not be redone in case of failure after this checkpoint. Using checkpoints, we do not need to read the complete log file and perform redundant redo operations in case of a failure.

https://en.wikipedia.org/wiki/Transaction_log

codex.cs.yale.edu/avi/db-book/db5/slide-dir/ch17.pdf

Answer:

Related questions

1 votes
1 votes
1 answer
1
Bikram asked Nov 26, 2016
334 views
Consider the join of relation R with a relation S. If R has $m$ tuples and S has $n$ tuples, then the maximum and minimum sizes of the join, respectively, are __________....
0 votes
0 votes
1 answer
2
Bikram asked Nov 26, 2016
245 views
A functional dependency of the form x → y is trivial ify ⊆ xy ⊂ xx ⊆ yx ⊂ y
0 votes
0 votes
1 answer
3
Bikram asked Nov 26, 2016
315 views
What does the following Tuple Relational Calculus query produce?The expression σθ1 (E1 ⋈θ2 E2) is the same as: E1 ⋈θ1^ θ2 E2 (σθ1 E1) ∧ (σθ2 E2 ) E1 ⋈ θ...