日誌鏈 的英文怎麼說

中文拼音 [zhìliàn]
日誌鏈 英文
log chain
  • : Ⅰ名詞1 (太陽) sun 2 (白天) daytime; day 3 (一晝夜; 天) day 4 (泛指某一段時間) time 5 (日...
  • : Ⅰ名詞1. (鏈子) chain Ⅱ動詞(用鏈栓住) chain; enchain Ⅲ量詞(計量海洋上距離的長度單位) cable length
  • 日誌 : daily record; journal
  1. If you recover the database after restoring one of the intermediate transaction log backups, that before the end of the log chain, you cannot restore the database past that point without restarting the complete restore sequence, starting with the full database backup

    如果要在還原其中一個中間事務備份之後恢復數據庫,則在日誌鏈結束之前,除非從完整數據庫備份開始重新啟動整個還原順序,否則,將無法還原該點之前的數據庫。最好的做法就是在恢復數據庫之前還原所有的事務,然後再另行恢復數據庫。
  2. A reflexive relationship is used to compare rows within the same table. in queries, this is called a self - join. refresh data

    在還原及緊接著的恢復之後,日誌鏈產生分叉,從而創建一個新的恢復分支。
  3. A log chain starts with a full backup of the database

    日誌鏈以完整數據庫備份開始。
  4. A continuous sequence of log backups is called a log chain

    連續的序列稱為「日誌鏈
  5. Log chain a continuous sequence of transaction logs for a database

    日誌鏈中的點,恢復過程中前滾在該點停止。
  6. Discusses the most important log sequence numbers for creating a log chain

    討論了用於創建日誌鏈的最重要的序列號。
  7. If you switch from the full or bulk - logged recovery model to the simple recovery model, you break the backup log chain

    如果從完整恢復模式或大容量恢復模式切換到簡單恢復模式,則需要中斷備份日誌鏈
  8. We recommend that you never use no log or truncate only to manually truncate the transaction log, because this breaks the log chain

    盡管可用此選項手動截斷事務,但是極力建議您不要這樣做,因為這會將日誌鏈斷開。
  9. If a transaction log backup in this log chain is lost or damaged, you can restore only transaction logs before the missing transaction log

    如果此事務日誌鏈中的事務備份丟失或損壞,則您只能還原丟失的事務之前的事務
  10. The database mirroring synchronous mode guarantees that the log chain is unaffected by a mirroring failover and that only valid log is restored

    數據庫鏡像同步模式可以保證日誌鏈不受鏡像故障轉移的影響,也可以保證只還原有效的
  11. This thesis introduces the background about this system and solving path at first ; then emphasises to describe ideas and implementation of clustering - algorithm ; furthermore expands on the characteristics and flows of each module ; analyses how to establish security policies ; finally summary full text, and suggest further works, otherwise, it also make point of personalizing hyperlinks and personalizing search - engines based on web data mining, making personalizing application more integrate

    本文首先介紹了論文所提問題的背景和解決途徑;然後說明了本系統的概念定義和目標;重點介紹了系統中聚類演算法的思想和實現;進而詳細闡述了系統各個功能模塊的特徵和流程;分析了如何通過服務器建立安全策略;最後進行了總結,並提出了下一步的工作。此外,論文提出了個性化引擎、個性化接與web數據挖掘的結合,使個性化應用更加全面。
  12. These options remove the inactive part of the log without making a backup copy of it, and truncate the log by discarding all but the active log. this breaks the log chain

    這些選項通過放棄活動以外的所有,無需製作的備份副本即可刪除不活動的部分,並中斷日誌鏈
  13. This alternative points out the redundant security offered by maintaining a chain of transaction log backups across a series of full database backups

    此備選過程指出了冗餘安全性,該安全性通過維護一系列完整數據庫備份中的事務日誌鏈備份來獲得。
  14. As you can see, we have all the bare essentials - a description of gentoo linux, a features list, a daily changelog automatically updated thanks to python, and a bunch of important links to the download sites, to our mailing list sign - up pages, and to cvsweb

    可以看到,我們有了所有最基本的要素gentoo linux的描述、功能部件列表、每「更改」 (由python自動更新) ,以及許多重要接(接到下載站點、郵件列表注冊頁面和cvsweb ) 。
分享友人