1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
7

The information stored in the _____ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program'

s abnormal termination, or a system failure such as a network discrepancy or a disk crash.
Computers and Technology
1 answer:
Semenov [28]3 years ago
5 0

Answer:

transaction log.

Explanation:

The information stored in the transaction log is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program's abnormal termination, or a system failure such as a network discrepancy or a disk crash.

You might be interested in
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
NO LINKS OR I WILL DELETE YOUR FORTNITE ACCOUNT
ozzi

Answer:

can i have ur fortnite account if u hav one and dont use it :) i only say that cuz u mentioned fortnite

Explanation:

with the free version you can add effects (cheap effects) cut the video, crop some parts. and posting leaves a watermark until u buy money

5 0
3 years ago
What is the output by: <br> print(len(stuff))
svetlana [45]

Answer:

The output will print out whatever the length is for stuff.

Explanation:

You use len() to get the length of the given string, array, list, tuple, dictionary, etc. Thus, passing in stuff using len will let the program to get the length of it.

7 0
2 years ago
Running the disk cleanup utility is a quick way to ________.
Likurg_2 [28]
Clear out unnecessary files, for example caches, caches are a collection of items of the same type stored in a hidden or inaccessible place.
8 0
3 years ago
Assume you are part of the systems development team at a medium-sized organization. The database will enable sales reps to have
Ivan
This is my answer


2. Presenting to a non-technical manager should be much more high-level, with few if any technical details. The focus should be on how the database design will benefit the business (for example, with faster report generation). Presenting to a technical manager would be focused much more on the technical aspects of the database, with less of a focus on the business benefits of the design.
6 0
3 years ago
Other questions:
  • Pointsfor a failover cluster, what type of network would you use to communicate with an iscsi device?
    15·1 answer
  • 1. Write a program to prompt the user to enter a single character and respond back whether or not the character is valid dna. 2.
    12·1 answer
  • A. experiment by purposely misconfiguring the gateway address on pc-a to 10.0.0.1. what happens when you try and ping from pc-b
    14·1 answer
  • Which command provides the source refrence at the bottom of the current page of a document?
    5·1 answer
  • Which programming element is used by a game program to track and display score information?
    10·2 answers
  • 4. What is the connection between productivity and Microsoft Office/ Office 365?
    13·1 answer
  • 1. ¿Qué es un cursograma?
    9·2 answers
  • Who is willam afton from five nights at freddy
    13·2 answers
  • Intelligent transportation systems use GPS to<br> Select all that apply.
    5·1 answer
  • 1. Open command prompt
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!