Recovering a database via reprocessing involves………..
a) restoring database and reprocessing
b) restoring database and reapplying
c) undoing changes made erroneous
d) recreating database
Which of the following is not true of DBMS security features?
a) users may be assigned to one or more
b) a role may be assigned
c) users and roles can have many permissions
d) objects have many permissions
Recovering a database via roll forward involves………..
a) restoring database and reprocessing
b) restoring database and reapplying
c) undoing changes made erroneous
d) recreating database
Recovering a database via reprocessing involves………..
a) restoring database and reprocessing
b) restoring database and reapplying
c) undoing changes made erroneous
d) recreating database
Which of the following would not be contained in a transaction log?
a) before images
b) type of operation
c) pointers
d) permissions
Copies of each database record or page before it was changed by a
transaction that are saved for use in database recovery are called…..
a) before images
b) type of operation
c) pointers
d) time of action