0% found this document useful (0 votes)
22 views4 pages

Dbms Module 4

Uploaded by

kripakbenzeer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views4 pages

Dbms Module 4

Uploaded by

kripakbenzeer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

unit 4

1. what is check points

Checkpoints in databases are like taking snapshots


of your work. They help ensure that if something
goes wrong, you can go back to where you left off
without losing too much progress. Checkpoints
save your current work and keep track of changes
so that recovery is easier in case of any issues or
crashes.

or

Certainly! In simpler terms, think of checkpoints in


a database like saving your game progress in a
video game. When you reach a certain point or
achieve something significant, you save the game
so that if you lose or something goes wrong, you
can start from that saved point rather than having
to begin from the very beginning. Similarly, in
databases, checkpoints save the current state of
data, ensuring that if there's a problem or system
crash, you can recover from a recent and stable
point instead of losing all your recent changes. This
helps maintain data consistency and reduces the
risk of data loss.

2. explain log base recovery techniques

Log-based recovery is like keeping a detailed diary


of everything you do. In case something goes wrong
or you forget something, you can look back at your
diary to see what happened and fix any mistakes. In
a database, this "diary" is called a transaction log,
and it helps restore the database to a stable and
accurate state after a problem or crash. It keeps
track of all the changes made to the database so
that if something goes wrong, the system can use
the log to fix it and get everything back in order.

3.explain the concept of shadow page

A shadow page is like making a copy of a page


before you write on it. If you need to change
something, you do it on the copy first. Once you're
sure everything is correct, you transfer those
changes to the original page. This way, you avoid
making mistakes directly on the original page and
keep your information safe until you're ready to
update it.

4. explain different security models Bella parallel


model Biba model, dives model, lace model

Certainly! Let's break down each security model in


simple terms:

1. **Bell-LaPadula Model:** This model focuses on


keeping secrets safe. It ensures that people can
only access information based on their security
level and prevents unauthorized access to sensitive
data.

2. **Biba Model:** The Biba Model is about


keeping data reliable. It ensures that data is not
changed or modified by unauthorized users,
protecting its accuracy and trustworthiness.
3. **Lattice-Based Access Control (LBAC):** LBAC
is like having different levels of security clearance.
It allows for fine-grained control over who can
access what information, based on their security
clearance and the sensitivity of the data.

If "Dives Model" or "Lace Model" are specific terms


you're referring to, please provide more context or
information so I can provide a simpler explanation.

You might also like