Ensure data integrity
The access method might provide locks, logging, backup and recovery, and transaction management features to ensure that source data matches virtual data.
The access method might provide locks, logging, backup and recovery, and transaction management features to ensure that source data matches virtual data.