The three goals of organizational memory are:
Move from Miami and San Francisco because of the high probability of natural disasters (hurricanes and earthquakes). Establish duplicate data centers in less risky areas.
There are three types of mechanisms that support backup and recovery:
Backup facilities are used to create copies of the database. Journaling facilities provide backup copies or audit trails of transactions and/or database changes. Recovery facilities are used to restore the database to a consistent state and restart the processing of transactions.
Because this is a large organization and the database does not need to be up at all times, either forward or backward recovery would be appropriate to use to ensure that the payroll system could be recovered at a low cost. Reprocessing transactions may be too time consuming because the organization is so large and the time it would take to reprocess the transactions may be very time consuming. The firm should back-up each week to tape cartridge (low cost) and store an extra copy at a remote site.
Reprocessing transactions would be a good backup and recovery strategy for this small manufacturing company. It is easy to use and the database is fairly small and not growing at a very rapid pace so the time it would take to reprocess the database would not be very high. You would expect to find a daily backup to cartridge tape or optical disk of the database.
Reprocessing transactions to recover data is considered a very simple form of recovering data. If a company uses reprocessing of transactions to recover data it is not necessary for them to recreate a database from stored image changes nor is there any special restart procedures. On the other hand, this method of data recovery can be very time consuming.
COMMIT is used to commit the changes made to a database and to make these changes permanent. It is invoked when no errors occurred during an transaction.
The purpose of locking is to prevent lost updates and inconsistent retrieval results.
A deadly embrace occurs when there is an impasse because two users lock certain resources, then request resources locked by the other. Deadly embraces can be avoided through either prevention or resolution. Prevention requires users to lock in advance all records they will require for a given transaction, resolution uses the DBMS to detect and break deadlocks.
SELECT AVG(gradepoint) FROM student WHERE major = "MIS" AND minor = "Philosophy" AND citizenship = "Norwegian" AND gender = "F";
The disadvantages of Data Encryption Standard are that the code used to encrypt the message can be broken by using a high speed computer to try every variation of possible keys and it is difficult to find a secure way to distribute the secret key. This problem is exacerbated by the frequent need to change keys.
The national stock exchange could use two methods of securing the privacy of their data: restricting data access and encrypting the data. No users should be given access to select, update, delete, or insert any records associated with any company other than their own. All the transmissions between a firm and the stock exchange should be encrypted.
This page is part of the promotional and support material for Data Management (sixth edition) by Richard T. Watson