In the sharp checkpoint recovery procedure, explain whether or not the system needs to obtain locks when it is using the after-images in the log to update the database.
What will be an ideal response?
No. No transactions are executed while recovery is taking place.
You might also like to view...
A security engineer wants to implement a site-to-site VPN that will require SSL certificates for mutual authentication. Which of the following should the engineer implement if the design requires client MAC address to be visible across the tunnel?
A. Tunnel mode IPSec B. Transport mode VPN IPSec C. L2TP D. SSL VPN
Which of the following best describes the use of CSS?
A. Write short programs that execute when a webpage downloads. B. Enable RWD and other adaptive features as specified by the W3C. C. Standardize the content of webpage content by defining styles such as font, margins, and more. D. Design webpages specifically for mobile browsers.