Free Essay

Introducing Transaction Log Files

In: Computers and Technology

Submitted By nancyb
Words 2158
Pages 9
Introducing Transaction Log Files
Each SQL Server 2000 database has at least one transaction log file and can have multiple transaction log files spread across a number of disks. Each transaction log file is a separate operating system file and is used by only one database. Each transaction log file generally has the .ldf filename extension (this extension is not required).
Each transaction log has a logical filename that is used in Transact-SQL statements and a physical filename that is used by the Windows operating system. Additional file properties include the file ID number, initial file size, file growth increment (if any), and maximum file size. Unlike data files that contain pages, transaction log files contain a series of transaction log records. A sequential log sequence number (LSN) identifies each transaction log record. Regardless of the number of physical log files, SQL Server 2000 treats the transaction log as one continuous log.
SQL Server 2000 logically divides each physical transaction log file into a number of virtual log files (VLFs). The number and size of virtual log files are determined dynamically based on the size of each transaction log file. Each transaction log file has at least two VLFs. Each growth increment (if any) is treated as a separate physical file with its own VLFs. The number or size of VLFs cannot be configured or set directly by the database administrator. SQL Server 2000 tries to maintain a small number of virtual file logs because it operates most efficiently with a small number of VLFs.
| |Tip |You should create a transaction log large enough to prevent the need for frequent growth. If automatic growth is |
| | |required, you should set a reasonable growth increment to prevent many small growth increments because small growth |
| | |increments will result in many small virtual log files, which can slow down recovery. |

When a database is created, the logical transaction log begins at the start of the first physical log file, which is also the beginning of the first virtual log file. The logical transaction log is made up of the portion of the transaction log that is required for recovery and backup. The portion of the transaction log required for recovery and backup will vary with the recovery model chosen. Backup and restore strategies are covered in Chapter 8.

How the Transaction Log Works

SQL Server 2000 uses a buffer cache, which is an in-memory structure, into which it retrieves data pages from disk for use by applications and users. Each modification to a data page is made to the copy of the page in the buffer cache. A modified buffer page in the cache that has not yet been written to disk is called a dirty page. The modification is recorded in the transaction log before it is written to disk. For this reason, the SQL Server 2000 transaction log is called a write-ahead transaction log. SQL Server 2000 has internal logic to ensure that a modification is recorded in the transaction log before the associated dirty page is written to disk. When SQL Server writes the dirty page in the cache to the disk, it is called flushing the page.
A transaction log record contains sufficient information to roll any database modification back or forward if necessary, including any extent allocations or index modifications. This ensures that any modification written to disk (such as a change to a data page or the creation of a new database object) can be rolled back in case the transaction that caused the modification fails to complete for any reason (such as a server failure or a rollback command), or rolled forward in case a completed transaction is not completely written to disk for any reason (such as a server failure).
| |Note |Because of this rollback capacity, a backup of the transaction log allows a database to be rebuilt when a drive |
| | |containing a data file fails. The rollback capacity is also the reason that the transaction log file for a database |
| | |should be on a different drive than the data file. |

SQL Server 2000 periodically writes dirty pages to disk from the buffer cache. These writes occur either when a database checkpoint process occurs or when an operating system thread (either an individual worker thread or a lazywriter thread) scans for dirty pages, writes the dirty pages to disk, and then clears space in the buffer cache to hold new data pages. Operating system threads may write dirty pages to disk before SQL Server 2000 knows whether the transaction is complete. However, if a transaction rolls back or never completes, the transaction log ensures that modifications made to disk by transactions that did not complete will be rolled back either via a rollback command or when the server restarts in the case of a server failure.

Checkpoint Process

The checkpoint process is designed to minimize the recovery time if the server fails, by minimizing the number of pages in the buffer cache that have not been written to disk. Checkpoints occur whenever • A CHECKPOINT statement is issued. • The ALTER DATABASE statement is used. • An instance of SQL Server 2000 is stopped normally. • An automatic checkpoint is issued. Automatic checkpoints are generated periodically based on the number of records in the active portion of the transaction log, not on the amount of time that has elapsed since the last checkpoint.
The checkpoint process records the lowest LSN that must be present for a successful rollback of an incomplete transaction. This number is called the minimum LSN (MinLSN). The MinLSN is based on the lowest LSN of the oldest active transaction, the beginning of the oldest replication transaction that has not been replicated yet to all subscribers, or the start of the checkpoint. The portion of the transaction log from the MinLSN to the most recent transaction log record is the active portion of the transaction log and must be present to ensure a successful rollback, if necessary. Whenever SQL Server 2000 starts (either normally or after a failure), a recovery process occurs on each database. The recovery process checks the transaction log for completed transactions that were not written to disk and rolls them forward. It also checks the transaction log for incomplete transactions and makes sure they were not written to disk. If they were written to disk, they are removed from the disk. The MinLSN from the most recent checkpoint identifies the earliest LSN that SQL Server 2000 must look at during this recovery process.
All transaction log records lower than the MinLSN are no longer active (the checkpoint ensures that records older than the MinLSN have been written to disk). To reuse this space, the transaction log records must be truncated (deleted) from the transaction log file. The smallest unit of truncation is an individual VLF file. If any part of a VLF is part of the active log, that VLF cannot be truncated. If the Simple Recovery model is used, the checkpoint process simply truncates each VLF within the inactive portion of the transaction log (allowing these VLFs to be reused). If the Full Recovery or Bulk-Logged Recovery models are used, you must back up the transaction log to truncate the inactive portion of the transaction log. Chapters 8 and 9 cover transaction log backups.
| |Note |Log truncations must be performed from the parts of the log before the MinLSN and can never be performed on any part of|
| | |the active log. |

Figure 5.3 illustrates the transaction log after a checkpoint has occurred and the inactive portion of the transaction log has been truncated. Notice that the MinLSN is earlier than the LSN of the checkpoint.
The checkpoint process frees space from the physical transaction log file so that the logical log file can reuse space when it reaches the end of the last physical transaction log file. When the end of the logical transaction log reaches the end of the last physical transaction log file, the logical transaction log wraps to the beginning of the first physical file (provided that the first VLF has been truncated). If the first VLF has not been truncated and the transaction log is not set to autogrow (or the drive is out of disk space), SQL Server 2000 cannot continue to function. Figure 5.4 illustrates this wrapping of the logical log to the beginning of the first physical transaction log file.
[pic]

Figure 5-3: The transaction log after truncation of the inactive portion.

[pic]

Figure 5-4: Wrapping of the logical log.

Operating System Threads

SQL Server 2000 uses individual worker threads and a lazywriter thread to periodically scan the memory buffer, schedule dirty pages for asynchronous writes to disk, and free inactive buffer pages for reuse. A thread is an operating system component that allows multiple processes to execute using separate asynchronous execution paths. The write of each dirty page is recorded in the transaction log before the write to disk can occur. Individual worker threads are threads from other SQL Server 2000 processes, such as an asynchronous read request by a user. These individual worker threads scan the buffer cache while waiting for their primary task to complete. A SQL Server 2000 lazywriter thread also periodically scans the free buffer list. If the free buffer list is below a certain point (dependent on the size of the cache), the lazywriter thread scans the buffer cache to free buffer space. The term "lazywriter" refers to the fact that this lazywriter thread sleeps for an interval of time, awakes and scans the memory buffer, and then goes back to sleep.
| |Note |The individual worker threads and the lazywriter thread write most of the dirty pages to disk between checkpoints, and |
| | |the checkpoint process generally finds few dirty pages to write to disk. The difference between the threads and the |
| | |checkpoint process is that checkpoints do not place the buffer pages back on the free list. These three processes work |
| | |together to smooth out the writing of data to disk in order to minimize disk bottlenecks and optimize performance. |

Introducing Recovery Models

SQL Server 2000 provides a choice of three recovery models: Simple, Full, and Bulk-Logged. Each database has a recovery model. The model chosen affects the size of the transaction log and the backup and recovery choices. Backup and recovery strategies are covered in Chapter 8.

Full Recovery Model

The Full Recovery model gives you the ability to recover a database to the point of failure or to a specific point in time. When a database uses the Full Recovery model, all operations are fully logged. This includes full logging of all large-scale operations (such as index creation and bulk loading of data using SELECT INTO, Bcp, or BULK INSERT). These large-scale operations frequently use a substantial amount of transaction log space. If you use this recovery model, you must make sure that the transaction log does not run out of space (particularly during a large-scale operation). Regular and frequent backups of the transaction log are required to ensure that the transaction log is regularly truncated to free up space for more records.

Bulk-Logged Recovery Model

When a database uses the Bulk-Logged Recovery model, all operations except certain large-scale operations are fully logged. Index creation and bulk load operations are minimally logged. The transaction log does not record sufficient detail of these large-scale operations to recover in case of a media failure after one of these operations. This helps reduce the amount of transaction log space used, but increases exposure to data loss after these large-scale operations. A full database backup after a large-scale operation is not required for recoverability. With the Bulk-Logged Recovery model, regular backups of the transaction log are still required to truncate the transaction log to free up space for more records, but these backups need to occur less frequently than with the full recovery model.
| |Note |Point-in-time recovery is not supported in the Bulk-Logged Recovery model. |

Simple Recovery Model

When a database uses the Simple Recovery model, all operations are fully logged (including all large-scale operations). However, because this recovery model does not rely on transaction log backups for database recovery, each checkpoint process truncates the inactive portion of the transaction log. This prevents the transaction log from running out of space in most circumstances. However, long-running transactions and unreplicated transactions marked for replication can still cause the transaction log to fill up. This recovery model is rarely used in production databases because the risk of loss of recently written changes is simply too great. When you use the Simple Recovery model, the database can be recovered only to the point of the last backup.
| |Note |The tempdb system database always uses the Simple Recovery model. The sample user databases, Northwind and pubs, use |
| | |the Simple Recovery model by default, but this can be changed. |

Similar Documents

Premium Essay

3 Organizational Polices

...date and whether the information has been viewed, modified, transferred, downloaded, or copied · No more than 300 different records can be accessed per day by the same user account. IS will be notified when an account has accessed more than 200 records in a 24 hour time period · When the system is accessed by remote users, Information Security will be notified immediately · Logs will be reviewed regularly on a daily basis. Anomalies will be investigated, recorded, and brought to the attention of senior staff in IS. Such anomalies can include, but not be confined to: excessive use of accessing records, excessive data modification, excessive data transfer, and record access spanning multiple departments accessed by the same account. Any account accessing more than 10 electronic health records (EHR) in less than an hour is deemed excessive. Any account accessing data from more than 1 department associated with that account is considered excessive Log File Retention Policy: Log files are text files created automatically during system operations triggered by any specific event. These logs are vital for troubleshooting and analysis. · Only senior IS staff...

Words: 977 - Pages: 4

Premium Essay

Administrators Guide

...Functional Guide Exigen Suite Release: 3.6 Dynamic Analytics Dashboard Administrator's Guide Document number: Platform_DynamicAnalyticsDasboard_FG_3.6 Revised: 10-11-2011 EXIGEN CONFIDENTIAL – FOR AUTHORIZED USERS ONLY Important Notice Information in this document, as well as the software products and programs described in it, is furnished by EIS Properties, Ltd. and/or affiliates (Exigen Insurance Solutions, Inc.) under license and may be used or copied only in accordance with the terms of such license. This document, the information contained in it, as well as the software products and programs desc ribed herein are considered confidential, proprietary, trade secrets of Exigen Insurance Solutions, Inc.). You may not copy, create derivatives, decipher, decompile, develop, or otherwise reverse engineer this document, the information contained in it, or the software products and programs described. Exigen Insurance Solutions, Inc. and its licensors retain all intellectual property and ownership rights to the information contained herein, as well as the software products and programs (including, but not limited to, software libraries, interfaces, source codes, documentation and training materials) described herein. The content of this document is furnished for informational use only, is subject to change without notice, may contain techni cal inaccuracies or typographical errors, and should not be construed as a representation, warranty or commitment by Exigen ...

Words: 8256 - Pages: 34

Premium Essay

Intro to Paypal

...PayPal Payments Pro Integration Guide Last updated: December 2012 PayPal Payments Pro Integration Guide Document Number: 100001.en_US-201212 © 2010-2011 PayPal, Inc. All rights reserved. PayPal is a registered trademark of PayPal, Inc. The PayPal logo is a trademark of PayPal, Inc. Other trademarks and brands are the property of their respective owners. The information in this document belongs to PayPal, Inc. It may not be used, reproduced or disclosed without the written approval of PayPal, Inc. Copyright © PayPal. All rights reserved. PayPal S.à r.l. et Cie, S.C.A., Société en Commandite par Actions. Registered office: 22-24 Boulevard Royal, L2449, Luxembourg, R.C.S. Luxembourg B 118 349 Consumer advisory: The PayPal™ payment service is regarded as a stored value facility under Singapore law. As such, it does not require the approval of the Monetary Authority of Singapore. You are advised to read the terms and conditions carefully. Notice of non-liability: PayPal, Inc. is providing the information in this document to you “AS-IS” with all faults. PayPal, Inc. makes no warranties of any kind (whether express, implied or statutory) with respect to the information contained herein. PayPal, Inc. assumes no liability for damages (whether direct or indirect), caused by errors or omissions, or resulting from the use of this document or the information contained in this document or resulting from the application or use of the product or service described herein. PayPal, Inc...

Words: 10583 - Pages: 43

Premium Essay

Chapter 8 Advanced Sql

...Chapter 8 Advanced SQL Chapter Objectives This chapter continues what was covered in Chapter 7. While Chapter 7 dealt with single table queries, Chapter 8 discusses joins. Other topics are also included, such as triggers, stored procedures, functions, Embedded SQL, Dynamic SQL, and Persistent Stored Modules. This chapter also contains a detailed discussion of transaction integrity as well as the SQL-99 enhancements and extensions to SQL. An overview of data dictionaries is also included. Chapter 7 is obviously a prerequisite for this chapter. Specific student learning objectives are included at the beginning of the chapter. From an instructor's point of view, the objectives of this chapter are: 1. To provide many examples of relational queries from SQL, which show such capabilities as multiple-table data retrieval (join and other operators such as difference, union, and intersection), explicit and implicit joining, and built-in functions. 2. To illustrate the differences between the joining and subquery approaches to manipulating multiple tables in SQL. 3. To introduce the transaction and concurrency control features of relational DBMSs. 4. To discuss the SQL-99 enhancements to SQL. 5. To briefly discuss the data dictionary facilities available in Oracle. 6. To discuss triggers and stored procedures and provide examples of how these might be used. 7. To briefly discuss dynamic and embedded SQL. Classroom Ideas 1. Have students program in some system...

Words: 2100 - Pages: 9

Premium Essay

Essay

...Unit IV ● ● ● Domain Name System Configuring Mail Services Configuring FTP Services Domain Name System ● ● ● ● ● ● ● Understanding DNS Understanding Types of DNS servers Examining Server Configuration Files Configuring a Caching DNS server Configuring a Secondary Master DNS server Configuring a Primary Master DNS server Checking Configuration Understanding DNS ● Domain Name System (DNS), which is used for name address resolution Name address resolution is, simply stated, the conversion of people friendly names into computer friendly numbers It is the mechanism by which Internet software translates names to addresses and vice versa Computers prefer numbers to names DNS provides the mapping between the two – ● ● ● ● I have “x”, give me “y” No way to search the database ● DNS is NOT a directory service Understanding DNS.... What is namespace? ● Sites are referenced by their fully qualified domain name (FQDN) Eg: www.kernel.org. Each string between the periods in this FQDN is significant Starting from the right and moving to the left, 3 components can be identified – – – ● ● ● The top-level domain component The second-level domain component The third-level domain component Third-level domain serverA . example . Top-level domain org . Root domain Second-level domain ● ● The root domain is represented by the simple dot (.) This portion of the domain namespace is managed by a bunch of special servers known as the...

Words: 5132 - Pages: 21

Premium Essay

Project

...Enq: Thomas Mathiba TERMS OF REFERENCE DEVELOPING AND IMPLEMENTING AN IT –BASED PROJECT MANAGEMENT SYSTEM 1. PROJECT TITLE Developing and Implementing an IT-Based Project Management System 2. BACKGROUND Skills development is one of the major challenges facing the new South Africa on its way to improved living standards for the majority of the population, increased productivity levels and a higher competitiveness on the world market. The Skills Development Act promulgated in 1998 lays the foundation to redress the past by introducing new training systems which place special emphasis on enabling the formerly disadvantaged to actively participate in the country’s economic activities. Since the launch of the Skills Development Strategy in February 2001, a lot of Sector Education and Training Authorities (SETAs) have made significant contribution in taking forward the broad objectives of the Skills Development Act. Some SETAs have succeeded to effectively co-ordinate education and training programmes at the workplaces by using practical project management approach to manage the learnership implementation. Whilst project management was once the exclusive job of project managers who most often coordinated the activities of specialized, complex, large scale projects, in the more recent years, however, the role of project managers and project management has been changing. The applicability of the project management...

Words: 2557 - Pages: 11

Premium Essay

Asignment

...Oracle® Database Concepts 10g Release 2 (10.2) B14220-02 October 2005 Oracle Database Concepts, 10g Release 2 (10.2) B14220-02 Copyright © 1993, 2005, Oracle. All rights reserved. Primary Author: Michele Cyran Contributing Author: Paul Lane, JP Polk Contributor: Omar Alonso, Penny Avril, Hermann Baer, Sandeepan Banerjee, Mark Bauer, Bill Bridge, Sandra Cheevers, Carol Colrain, Vira Goorah, Mike Hartstein, John Haydu, Wei Hu, Ramkumar Krishnan, Vasudha Krishnaswamy, Bill Lee, Bryn Llewellyn, Rich Long, Diana Lorentz, Paul Manning, Valarie Moore, Mughees Minhas, Gopal Mulagund, Muthu Olagappan, Jennifer Polk, Kathy Rich, John Russell, Viv Schupmann, Bob Thome, Randy Urbano, Michael Verheij, Ron Weiss, Steve Wertheimer The Programs (which include both the software and documentation) contain proprietary information; they are provided under a license agreement containing restrictions on use and disclosure and are also protected by copyright, patent, and other intellectual and industrial property laws. Reverse engineering, disassembly, or decompilation of the Programs, except to the extent required to obtain interoperability with other independently created software or as specified by law, is prohibited. The information contained in this document is subject to change without notice. If you find any problems in the documentation, please report them to us in writing. This document is not warranted to be error-free. Except as may be expressly permitted in your license agreement...

Words: 199783 - Pages: 800

Free Essay

Information Flow of Standard Bank Ltd.

...TERM PAPER ON Information System of Standard Bank Limited [pic] Submitted To: Dr. Md. Mosharraf Hossain Professor Department of Management University of Dhaka Submitted By: Sabbir Ahmed 3-11-21-065 Department of Management University of Dhaka Date of Submission 09.11.2014 Preface Theoretical knowledge, what we learn through our academic activities, is not sufficient to prepare ourselves for the life battle. Academic knowing is needed to be backed up by practical experience. In business studies, besides their usual theoretical course works, students are required to fulfill some practical assignments which are set by the course teachers to examine the depth of knowledge learned by the students. Most of the time, the students are required to study a practical working environment of any organization or industry to critically examine ‘what is actually going on’ in the real world.    This document is prepared as a result of an assignment set by the honorable course teacher of the course “Fundamental of MIS”. .My duty was to describe “Information System of My Organization.” and report what I found. This is how this assignment paper titled “Information System of Standard Bank Limited.” was emerged. I believe this paper is a reflection of accumulation of my effort, learning and dedication. Letter of Transmittal November 8, 2014 Dr. Mosharraf Hossain Professor MBA (Evening) Program Department...

Words: 1837 - Pages: 8

Free Essay

Advanced Web Development

...Advanced Web Development/WEB 407 Introduction Kudler Fine Foods is a specialty food store offering imported and domestic fare including baked goods, meats & seafood, produce, cheese & dairy, and wine. With three locations in the San Diego metropolitan area (La Jolla, Del Mar and Encinitas), Kudler’s mission is to provide their customers with, “…the finest in selected foodstuffs, wines, and related needs in an unparalleled consumer environment” (Apollo Group Inc. 2009). In an effort to increase customer convenience and business revenue, Kudler Fine Foods wants to sell their products on the internet. By adding both item inventory and online ordering pages to their current site, Kudler Fine Foods can accomplish this goal. There are, however, additional systems necessary on the back-end to make this system possible. According to TheConsumerCollective website (2010), “E-commerce spending continues to outpace analyst’s predictions… spending will reach $259 billion in 2014, and $278.8 billion by 2015” (Suetos, 2010). Over the past few years, customer confidence with online shopping has increased significantly. Customers feel more at ease with purchasing their products from online retailers than they did just years ago. This proposal will demonstrate the major components necessary for Kudler Fine Foods to begin offering their products online. It will discuss the database design, how the scripting language PHP will be set up to provide a “shopping cart” for ease...

Words: 3409 - Pages: 14

Free Essay

Internet Security

...ABSTRACT The paper discusses the topics regarding, 1) Internet Frauds ;2) to analyze user’s satisfaction on internet security by using Secure Socket Layer (SSL); and 3) to make people aware of internet fraudsters. Six research questions were utilized in this study. This study examines whether secure socket layer and its certificate would protect online users from fraudsters while they browse websites. The six research questions are as follows: • Are there any security breaches occurring with the usage of SSL certified website? • Can we stop internet frauds by making people aware of it? • Is secure socket layer used in all websites? • Is Secure Socket Layer reliable? • Does Secure Socket Layer protect online users from fraudsters? • Are users satisfied with security provided by SSL authentication? TABLE OF CONTENTS ABSTRACT ii INTRODUCTION 1 Statement of Purpose and Problem 2 Principle Research Questions 3 Assumption of the study 3 Limitation of the Study 3 Definition of Terms 3 REVIEW OF LITERATURE 5 Internet 5 How SSL Works? 8 What is a “certificate” in SSL certificate? 8 What is an SSL certificate? 9 METHODOLOGY 11 Selection of subjects 11 Instrumentation 11 Method 13 ANALYSIS 15 REFERENCE i INTRODUCTION The term internet refers to prevalent network of networks connected on the Earth and the security provided to the networks in order to maintain confidentiality of the data is called Internet security. Network can be defined as a group of...

Words: 3516 - Pages: 15

Premium Essay

Mobile Database

...Mobile Databases: a Report on Open Issues and Research Directions * Action members 1 EPFL, 2U. Grenoble, 3INRIA-Nancy, 4INT-Evry, 5U. Montpellier 2, 6U. Paris 6, 7U. Versailles Abstract This paper reports on the main results of a specific action on mobile databases conducted by CNRS in France from October 2001 to December 2002. The objective was to review the state of progress in mobile databases and identify major research directions for the French database community. This paper gives an outline of the directions in which the action participants are now engaged, namely: copy synchronization in disconnected computing, mobile transactions, database embedded in ultra-light devices, data confidentiality, P2P dissemination models and middleware adaptability. 1 ** Introduction At the end of 2001, the National Center for Scientific Research (CNRS) in France launched a number of specific actions (AS) in order to identify the most challenging issues to be investigated by the French research community (http://www.cnrs.fr/STIC/actions/as/as.htm). The impact of ubiquitous and pervasive computing in many aspects of our everyday life motivated the CNRS to fund a specific action on mobile databases, in October 2001 for an initial period of one year. This paper reports on the main results of this action. Different classes of mobile applications can be distinguished depending on the data management requirements they introduce. The most common applications...

Words: 4932 - Pages: 20

Premium Essay

Databasse Management

...Fundamentals of Database Systems Preface....................................................................................................................................................12 Contents of This Edition.....................................................................................................................13 Guidelines for Using This Book.........................................................................................................14 Acknowledgments ..............................................................................................................................15 Contents of This Edition.........................................................................................................................17 Guidelines for Using This Book.............................................................................................................19 Acknowledgments ..................................................................................................................................21 About the Authors ..................................................................................................................................22 Part 1: Basic Concepts............................................................................................................................23 Chapter 1: Databases and Database Users..........................................................................................23 ...

Words: 229471 - Pages: 918

Free Essay

Websphere Wlm

...configuration that can have multiple versions and be maintained in source control along with the applications. This IBM Redpaper™ publication presents a high-level view of some of the features and enhancements in WebSphere Application Server V8.5. and WebSphere Application Server V8.5.5. © Copyright IBM Corp. 2012, 2013. All rights reserved. ibm.com/redbooks 1 WebSphere Application Server overview Application infrastructure trends show a push towards rapid application development and delivery. This trend is driving simplified, integrated, and automated development and operation lifecycles. The explosion of mobile, social, and cloud applications is driving unprecedented demands on middleware infrastructures. The combination of huge transaction volumes against massive amounts of data with little tolerance for delays is also driving the need for...

Words: 12331 - Pages: 50

Premium Essay

Drm-Fdm-Odi

...DRM, FDM, ODI…OMG Which Tool Do I Use? Edward Roske eroske@interrel.com BLOG: LookSmarter.blogspot.com WEBSITE: www.interrel.com TWITTER: ERoske Introduction to EPM Architect: Cheaper…Faster…Better Edward Roske eroske@interrel.com BLOG: LookSmarter.blogspot.com WEBSITE: www.interrel.com TWITTER: ERoske Thinking Outside the Cube: NonFinancial Applications of Oracle Essbase Edward Roske eroske@interrel.com BLOG: LookSmarter.blogspot.com WEBSITE: www.interrel.com TWITTER: ERoske About interRel Reigning Oracle Titan Award winner – EPM & BI Solution of the year 2008 Oracle EPM Excellence Award 2009 Oracle EPM/BI Innovation Award One of the fastest growing companies in the world (Inc. Magazine, ‟08 & ‟09 & „10)  Two Hyperion Oracle ACE Directors and one Oracle Ace  Founding Hyperion Platinum Partner; now Oracle Platinum Partner  Focused exclusively on Oracle Hyperion EPM software  Consulting  Training  Infrastructure and Installation  Support  Software sales     4  7 Hyperion Books Available:         Essbase (7): Complete Guide Essbase System 9: Complete Guide Essbase System 9: End User Guide Smart View 11: End User Guide Essbase 11: Admin Guide Planning: End Users Guide Planning: Administrators To order, check out www.LuLu.com •5 •Copy right © 2007, Hy perion. All rights reserv ed. Select interRel Customers 6 Abstract  DRM, FDM (or is it FDQM), ODI, ERPI, EPMA…thanks, Oracle, for all of these tools but which tool...

Words: 2902 - Pages: 12

Premium Essay

Information and Survey Analysis

...1. An IS auditor is reviewing access to an application to determine whether the 10 most recent "new user" forms were correctly authorized. This is an example of: A. variable sampling. B. substantive testing. C. compliance testing. D. stop-or-go sampling. The correct answer is: C. compliance testing. Explanation: Compliance testing determines whether controls are being applied in compliance with policy. This includes tests to determine whether new accounts were appropriately authorized. Variable sampling is used to estimate numerical values, such as dollar values. Substantive testing substantiates the integrity of actual processing, such as balances on financial statements. The development of substantive tests is often dependent on the outcome of compliance tests. If compliance tests indicate that there are adequate internal controls, then substantive tests can be minimized. Stop-or-go sampling allows a test to be stopped as early as possible and is not appropriate for checking whether procedures have been followed. 2. The decisions and actions of an IS auditor are MOST likely to affect which of the following risks? A. Inherent B. Detection C. Control D. Business The correct answer is: B. Detection Explanation: Detection risks are directly affected by the auditor's selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks are controlled by the actions of the company's management. Business...

Words: 97238 - Pages: 389