subject

Consider the log shown below.

lsn log
00 update: t1 writes p3
10 update: t1 writes p1
20 update: t1 writes p2
30 update: t2 writes p3
40 begin checkpoint
45 end checkpoint
50 update: t3 writes p4
60 t1 commit
70 update: t3 writes p2
80 t1 end
90 update: t2 writes p1
100 t2 commit crash, restart
in this log, we store information about 3 transactions. after the log record with lsn 100, the system crashes and then we restart. we use the aries recovery algorithm discussed in chapter 18 in the book. based on that, answer the following questions:

1. what is done during the analysis phase?
2. what is done during the redo phase?
3. what is done during the undo phase?
4. show the log when recovery is complete, including all non-null prevlsn and undonextlsn values in log records.

ansver
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 21:30, elsauceomotho
Im doing this last minute and literally none of my neighbors or people that my dad works with use excel so if anyone could me make up an example
Answers: 1
image
Computers and Technology, 22.06.2019 22:00, mrnotsosmart744
Discuss the ways in which electronic information associated with payments is addressed in terms of security. include encryption, secure sockets layers, and secure electronic transactions in your discussion. are there any other ways that consumers and businesses can keep their payment information secure in an electronic commerce environment? do you feel that your information is safe when conducting electronic business? why or why not?
Answers: 1
image
Computers and Technology, 23.06.2019 10:00, karissanichole18
Install and use wireshark program ( send back screen shots and other vital information) case project 3-2: decode a tcp segment in a wireshark capture in this chapter, you walked through tcp segment to interpret the data included in its header. in this project, you use wireshark to capture your own http messafes, examine the tcp headers, and practice interpreting the data you'll find there. 1. open wireshark and snap the window to one side of your screen. open a browser and snap that window to the other side of your screen so you can see both windows.
Answers: 2
image
Computers and Technology, 23.06.2019 13:00, torresnoemi899
Which of the following statements is false? a. a class can directly inherit from class object. b. if the class you're inheriting from declares instance variables as private, the inherited class can access those instance variables directly. c. a class's instance variables are normally declared private to enforce good software engineering. d. it's often much more efficient to create a class by inheriting from a similar class than to create the class by writing every line of code the new class requires.
Answers: 3
You know the right answer?
Consider the log shown below.

lsn log
00 update: t1 writes p3
10 update:...

Questions in other subjects:

Konu
English, 16.04.2020 23:08