1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulijaS [17]
3 years ago
5

When is the redo log buffer written to the redo log file?

Computers and Technology
1 answer:
natka813 [3]3 years ago
5 0

Answer: B)The redo log buffer becomes one-third full.

Explanation:Redo log buffer is the type of buffer file that is present for storing the changes that have been done in data. Database changes are the made goes in the records of the redo entries.the change of the buffer to the redo files is done when the buffer contains change records which are full till the one-third section, thus conversion takes place from the redo buffer to the redo files.

You might be interested in
What device operates at the network layer (layer 3) of the osi model and forwards packets across computer networks?
Oksi-84 [34.3K]
Yup. D) Router. 


Good guess! (:
7 0
3 years ago
What is the only language a microprocessor can process directly but most programmers almost never write programs in this code?
Phantasy [73]
Assembly language, a.k.a. machine language.
6 0
3 years ago
Which of the following best explains the different between Cut and Copy? a. When you copy text you are permanently deleting it,
Vilka [71]
B. When you copy text it remains in its original location and places it on the clipboard. Cutting text removes it from its original location and places it on the clipboard

5 0
3 years ago
Read 2 more answers
The files in James's computer were found spreading within the device without any human action. As an engineer, you were requeste
krok68 [10]

This type of infection is this a characteristic of a computer worm

For better understanding, lets explain what computer Worms means.

  • Computer Worm are commonly referred to as an independent program that often replicates or double itself by copying a fraction of itself onto another computer. They often exit in two forms. They are:

  1. Network Worm is a type of computer worm that replicates or copies different fraction of itself to computers linked together in known network.
  2. Host Worm is a type of computer worm that replicates or copies itself to another computer in a network and later on remove or deletes itself completely from the previous computer in which it was in.
  • Computer worm are capable of replicating themselves without human intervention.

Learn more about computer worm from

brainly.com/question/19631265

4 0
3 years ago
A rang check that could be use to validate... Date and time
lisov135 [29]

A range check is often used when a person works with data consisting of numbers, dates and times, or currency, ensuring that a number is within a specific range.

Explanation:

  • Range checks allow a person to set suitable boundaries.
  • An example of a range check is checking to see if the value of a 16-bit integer is within the capacity of a 16-bit integer. When a range check is performed, upper and lower boundaries are specified.
  • Range check is a validation check which can be applied to numeric fields. This is done to ensure that only numbers within a certain domain can be entered into a field. Remember that this does not necessarily mean that the data entered will be correct. But it will certainly lie within reasonable limits.
  • A method of validation which checks that data falls between an upper and lower acceptable value.
  • This validation check which can be applied to numeric fields. This is done to ensure that only numbers within a certain domain can be entered into a field. Remember that this does not necessarily mean that the data entered will be correct. But it will certainly lie within reasonable limits.
5 0
3 years ago
Other questions:
  • You need to design a data storage scheme for Hayseed Heaven library data system. There are several hundred thousand large data r
    8·1 answer
  • Identify the parts used in an electric circuit- Tiles
    9·2 answers
  • Today’s mobile phones and some PCs use a touch user interface called a _____ to allow people to control the personal computer.
    7·1 answer
  • What adds the element carbon to the environment
    10·2 answers
  • Universal Containers (UC) has a great user interface for their Customer Community Knowledge Base. UC has multiple Communities an
    15·1 answer
  • HELP ME FAST???
    15·1 answer
  • What is Game Theory?
    6·1 answer
  • Consider a computer that uses 5 bits to represent positive integers and uses all 5 bits to represent the value.
    9·1 answer
  • WHO WANT P O I N T S.................................................
    9·1 answer
  • How do you flatten a 2D array to become a 1D array in Java?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!