Correct Answer : 2
Explanation : There are two checkpoint approaches :* Basic Checkpointing* Symbolic Checkpointing