Describe procedures that should be designed to create automatic backup files. In a paragraph, be sure to consider the pros and cons of these procedures.

What will be an ideal response?


Backup will be performed on two levels.



a. All transactions entering the system from online screens will be placed on log (or journal) transaction files. These are located on a smaller, second hard disk within the server computer. If there is a head crash or other problem on the main hard disk, the backup files would still exist. The format of the log files is:





b. All database files are copied to tape every night. These are removed to one of the other campus locations and stored in a vault.



Advantages:



i. Backup of all major files

ii. Faster backup because major files do not have to be backed up before each update

iii. Continual backup using the log files



Disadvantages:



i. Programs must be written to restore database records in a batch mode from the log files

ii. Streamer tape units may be initially expensive

Computer Science & Information Technology

You might also like to view...

Which of the following is false?

a. To receive a list initializer as an argument to a constructor, you can declare the constructor’s parameter as type list_initialier where T represents the type of the values in the list initializer. b. To receive a list initializer as an argument to a constructor, you can declare the constructor’s parameter as type initializer_list where T represents the type of the values in the list initializer. c. It’s not possible to pass a list initializer to a constructor. d. (a) and (c).

Computer Science & Information Technology

The boolean data type may contain which of the following range of values?

a. -128 to + 127 b. true or false c. -2,147,483,648 to +2,147,483,647 d. -32,768 to +32,767

Computer Science & Information Technology

Which command ends a case statement?

A. ;;end B. !!end C. stop D. esac

Computer Science & Information Technology

A Windows- based computer is infected with malware and is running too slowly to boot and run a malware scanner. Which of the following is the BEST way to run the malware scanner?

A. Kill all system processes B. Enable the firewall C. Boot from CD/USB D. Disable the network connection

Computer Science & Information Technology