answersLogoWhite

0


Best Answer
The Write-Ahead Logging Protocol:Must force the log record for an update before the corresponding data page gets to disk.Must write all log records for a Xact before commit. #1 guarantees Atomicity.#2 guarantees Durability.
User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is write-ahead log protocol?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which protocol is used for remote log in?

Telnet


What protocol manages the log in for a on demand broadband connection?

PPPoE


Is a terminal emulation protocol used to log on to remote host using the tcp ip protocol suite?

telnet


What is a terminal emulation protocol used to log on to remote hosts using the TCPIP protocol suite?

Telnet


When you log on to a local system does the Kerberos authentication protocol is used to communicate between the login dialog and the security subsystem?

No it does not.


Which protocol is used to connect and use a remote computer program?

RDP. Remote desktop protocol in Microsoft systems. Also known as terminal services on port 3389.


What is telenet?

Noun A network protocol that allows a user on one computer to log on to another computer that is part of the same network.


Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in local?

RDP


How do you log in to switch through Ethernet?

Most inexpensive switches do not have the capability to log into them because they don't need to be managed or configured. For managed switches that do, either the use of Telnet protocol or a console port will allow access to the switch.


What protocol is used to create a basic layer of security for a wireless network?

A protocol that is used to create a basic layer of security for a wireless network is to set up a password and log in. This way no one else can use the wireless network, but the owner.


Why is TCP-IP the chosen network protocol?

TCP IP is the protocol of choice when it comes to networking due to its ability to confirm the receipt of packets by the intended destination. As such, this protocol in email and web browsing.


How do you log into Unix?

You can log in via telnet or ssh protocol for a command line prompt environment to Unix, or you can use a graphical user interface such as KDE or Gnome, or the CDE environment via X-windows. In any of these protocols, you must supply a username and password to successfully log into the Unix system.