1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zvonat [6]
3 years ago
7

The write-ahead logging (WAL) protocol simply means that Select one: a. the log record for an operation should be written before

the actual data is written b. writing of a data item should be done ahead of any logging operation c. all log records should be written before a new transaction begins execution d. the log never needs to be written to disk
Computers and Technology
1 answer:
tatuchka [14]3 years ago
8 0

Answer:

The correct answer to the following question will be Option a.

Explanation:

  • The WAL method ensures that neither updates to something like a database site can be discarded onto the disc before the relevant payment log documents are first published to either the disc with this kind of update.
  • The above procedure essentially means you need to write the logging records for an event before another individual data is entered or presented.

Some other available scenarios have no connection with the given situation. So the proper answer seems to be the choice a.

You might be interested in
You are capturing packets with a network sniffer and notice a number of packets that are flagged by the sniffer and described as
Rom4ik [11]

Answer:

Transport Layer                                    

Explanation:

  • Transport layer is responsible for correcting data transmission errors which is done by requesting retries also called re-transmission of packets in case of data loss or corrupted data.
  • Transport layer ensures end to end delivery of data making sure that the data is received correctly and in same order in which it was sent.
  • Transmission Control Protocol (TCP) is a protocol in this layer that continues to transmit data packets securely from sender to receiver, identifying packet losses.
  • Transport layer works on packet loss issues and corrects data transmission errors.
  • It has flow control and error control services manage data transmission rate and ensures data is received without error.
  • So in case of transmission errors and re-transmission requests transport layer should be investigated.
5 0
3 years ago
One reason to buy a home instead of rent a home is:
vazorg [7]
A is the correct Answer

7 0
4 years ago
What is the difference between a LAN and WAN? how do these two networks interact?​
stealth61 [152]
A LAN, abbreviated from Local Area Network, is a network that covers a small geographical area such as homes, offices, and groups of buildings. Whereas a WAN, abbreviated from Wide Area Network, is a network that covers larger geographical areas that can span the globe.

A Wide Area Network (WAN) operates over a much larger area, as they interconnect LANs to allow them to exchange data.
3 0
3 years ago
"in program arrays12.java a swap method is called. does the swap method exchange parameter values x and y?"
Artist 52 [7]

Answer:

The answer is "True".

Explanation:

In the given question option is missing, that is "true or false", which can be described as follows:

In the given question, it is declared, that an "arrays12.java" program file is declared So, the class name is  "arrays12" because in java class name and the program file name is the same.

  • Inside the class, a swap method is called, that first accepts value.
  • After accepting the value it is defined as another variable, that swap variable values, that's why the answer to this question is true.
7 0
3 years ago
What are the main approaches for dealing with deadlock?
alina1380 [7]

Answer:

Deadlock ignorance

Deadlock prevention

Deadlock avoidance

& Detection and recovery

Hope This Helps!!!

3 0
3 years ago
Other questions:
  • 1. Which of the following is required to create a computer simulation?
    11·1 answer
  • You have an interface on a router with the IP address of 192.168.192.10 /29. What is the broadcast address the hosts will use on
    15·1 answer
  • Complete the crossword puzzle.
    12·2 answers
  • Which of the following actions would not reduce software piracy? reducing the cost of software. offering downloads of software.
    12·2 answers
  • Windows 8 has a built-in antivirus program called
    10·1 answer
  • 4.2 lesson practice helps plzs
    9·1 answer
  • Given N lines of input, print the 3rd character from each line as a new line of output. It is guaranteed that each of the n line
    8·1 answer
  • What do the Brainly points do? sorry im new here and i dont know how to internet rn .-.
    7·2 answers
  • G i r l s o n l y j o i n <br> id= ons jcuv jke
    13·2 answers
  • I've been stuck on these two basic javascript assignments for an embarrassingly long time. The teacher refuses to help me and th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!