Fascination About disk recovery

Handle files also report specifics of checkpoints. When a checkpoint begins, the Management file documents information about the subsequent entry that has to be entered into the web redo log.For instance, primary memory and cache memory are examples of risky storage. They are really rapid but can store only a little amount of money of data.The exam

read more