Question

In: Accounting

Explain the GFS backup technique. Is it used for sequential files or direct access techniques? Explain.

Explain the GFS backup technique. Is it used for sequential files or direct access techniques? Explain. 

 

Solutions

Expert Solution

The GFS backup technique, which is used for sequential master files, begins when the current master file (the father) is processed against the transaction file to produce a new updated master file (the son). Note that the son is a physically different file from the father. With the next batch of transactions, the son becomes the current master file (the new father), and the original father becomes the backup file (grandfather). This procedure is continued with each new batch of transactions, creating several generations of backup files. When the desired number of backup copies is reached, the oldest backup file is erased (scratched). If the current master file is destroyed or corrupted, it is reconstructed by processing the most current backup file against the corresponding transaction file.


The GFS backup method involves sequential master files. Current file updated with transactions becomes the new master, forming generations of backups.

Related Solutions

The term “backup is often used in computing to talk about making copies of data files...
The term “backup is often used in computing to talk about making copies of data files so that they can be replaced in case of loss. But in this case of business it is not just being able to replace data that should concern managers. Explain how a business backup plan needs to be much more comprehensive.
Explain why atomic absorption spectroscopy and ion chromatographic (IC) technique are used as complementary techniques for...
Explain why atomic absorption spectroscopy and ion chromatographic (IC) technique are used as complementary techniques for water analysis.
1. Triangulation is a technique used in estimating where the results of three estimating techniques are...
1. Triangulation is a technique used in estimating where the results of three estimating techniques are averaged or compared to improve the overall estimate based on a single method. True False 2. Quality is directly impacted by the balance achieved in the triple constraint. True False 3. Which of the following is NOT a knowledge area for project managers as specified in your text a. Time Management b. Cost Management c. Risk Management d. Skills Management
Which statement is NOT correct? The Virtual storage Access Method a. is used for very large files ..
Which statement is NOT correct? The Virtual storage Access Methoda. is used for very large files that need both direct access and batch processing.b. may use an overflow area for records.c. provides an exact physical address for each record.d. is appropriate for files that require few insertions or deletions. 
Give a list of 5 techniques used to produce HVDC Describe each technique in detail
Give a list of 5 techniques used to produce HVDC Describe each technique in detail
Describe the different techniques of influence used by organized interests. When is one technique preferable to...
Describe the different techniques of influence used by organized interests. When is one technique preferable to another? With the rise of the New Politics movement, different techniques are now used more frequently. Which ones? Why, do you think, are these techniques so well suited to New Politics?
The Falcon Company does not maintain backup documents for its computer files. In June, some of...
The Falcon Company does not maintain backup documents for its computer files. In June, some of the current data were lost, and you have been asked to help reconstruct the data. The following beginning balances on June 1 are known: Direct Materials Inventory $ 13,100 Work-in-Process Inventory 5,600 Finished Goods Inventory 14,100 Manufacturing Overhead Control 27,500 Accounts Payable 7,100 Reviewing old documents and interviewing selected employees have generated the following additional information: The production superintendent's job cost sheets indicated that...
In addition to cryptographic techniques, identify and explain the suite of techniques that are increasingly used...
In addition to cryptographic techniques, identify and explain the suite of techniques that are increasingly used to provide authentication to hospital information systems.
Explain how the nonprobability technique of quota sampling can be used to mimic the probability technique...
Explain how the nonprobability technique of quota sampling can be used to mimic the probability technique of stratified random sampling. Give an example.
How could advanced-access techniques be used for the following types of facilities? a. Ambulatory surgery center...
How could advanced-access techniques be used for the following types of facilities? a. Ambulatory surgery center b. A free standing imaging center
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT