Indicate how pointer-based schemes can be made less susceptible to damage by the loss of a pointer.

What will be an ideal response?


A widely used technique to ensure reliability is to keep redundant sets of pointers so
that if a pointer is lost, it may easily be reconstructed.Another technique is to performmetadata
manipulation operations as transactions. This increases execution overhead, but it does
so to ensure reliability.

Computer Science & Information Technology

You might also like to view...

Select the false statement. Depending on the compiler:

a. A failed new operation can return a 0. b. A failed new operation can throw a bad_alloc exception. c. A failed new operation can throw an exception if the header file has been included. d. A failed new operation can automatically be caught at compile time.

Computer Science & Information Technology

To specify the source of a sound or video inserted with the object element, the param value attribute must have the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

To view a list of Desired State Configuration resources, you can use the Get-DscResources PowerShell cmdlet.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Critical Thinking Questions Case 1-1 ? Mark is given the responsibility of setting up a method for distributing information at the university where he works. ? ?Mark's assignment changes and he needs to develop a solution for the finance office at the university. He will need to allow vendors to submit their bills online and to check if the university has paid their bills. Which of the following technologies is the best choice for him?

A. ?Intranet B. ?Extranet C. ?Internet D. ?Vendornet

Computer Science & Information Technology