Which of the following is suitable as a method for securing the information needed to recover a database in case of a software fault in transaction processing?
a) A checkpoint is set and the contents prior to updating are recorded to a journal file.
b) At the set checkpoint, the contents after updating are recorded directly to a dump file.
c) At the set checkpoint, a dump file for the entire database is acquired.
d) The contents prior to updating are recorded to a journal file when the database is updated.