Computations of database characteristics

Assignment Help Data Structure & Algorithms
Reference no: EM1380466

Question: A file has r=20,000 student records of fixed-length. Each record has the following fields: NAME (30 bytes), SSN (9 bytes), ADDRESS (40 bytes), PHONE (9 bytes), BIRTHDATE (8 bytes), SEX (1 byte), MAJORDEPTCODE (4 bytes), MINORDEPTCODE (4 bytes), CLASSCODE (4 bytes, integer), and DEGREEPROGRAM (3 bytes). An additional byte is used as a deletion marker.

(a) Compute the record size R in bytes.
(b) Compute the blocking factor bfr and the number of file blocks b assuming an unspanned organization.
(c) Suppose the file is ordered by SSN; compute the number of blocks it takes to search for a record given its SSN value by doing a binary search.

 

Reference no: EM1380466

Questions Cloud

Question about lan and wan : Think about the following two scenarios two computers are connected to a LAN using a total of 20-feet of cable, and two computers are connected over the Internet and are 8000 miles from each other.
Illustrate what tradeoffs did you contemplate : When faced with challenges, illustrate what information did you use to make your decision also illustrate what tradeoffs did you contemplate.
Explain why manager believe that fundamental contradiction : Explain why manager believe that fundamental contradiction to be encountered in organizational life also especially in health care organizations.
Sharing a large computer file : Assume you are sitting at desk at office and using your laptop computer. The boss calls an emergency meeting for you and many colleagues, and asks everyone to bring his or her laptop computer.
Computations of database characteristics : A file has r=20,000 student records of fixed-length. Suppose the file is ordered by SSN; compute the number of blocks it takes to search for a record given its SSN value by doing a binary search.
You may write on an ethical dilemma you have individually : You may write on an ethical dilemma you have individually experienced provided it isn't something that is confidential or seen at work
Paul has confined some powerful words for the believer : Paul has confined some powerful words as well as encouragement for the believer. Our call to sacrificially submit ourselves to others doesn't begin with our sacrifice however with God's blessings
Predict ticket sales for the upcoming season : You have projected income elasticity to be 0.75. Describe what this means and why it is important for management.
Most populations with reliable data birth rates vary : For instance in most populations with reliable data birth rates vary by the season of the year. The seasonality of births isn't identical in all populations.

Reviews

Write a Review

 

Data Structure & Algorithms Questions & Answers

  Users and it organizations arm against phishing attacks

How users and IT organizations must arm themselves against these attacks?

  Write algorithm for program to compute the sum of number

Write an algorithm for a program which will satisfy following requirements: - Asks a user how many numbers they want to calculate.

  Formula to compute number of address bus conductors

If an address bus needs to be able to address 8-devices, how many conductors will be needed? What if each of those devices also requires to be able to talk back to the I/O control device?

  Greedy strategy for finding a shortest path

Think about the given greedy strategy for finding a shortest path from vertex start to vertex goal in a connected graph.

  Primitives-remove ambiguities in algorithm-s representation

Describe how the use of primitives helps remove ambiguities in an algorithm's representation.

  Question about java hashtables

Prompt the user for a string, and display the corresponding number. For example, if the user types "five", the program would output "5". This must be done using the hashtable as created in the previous step.

  Process of insertion into a heap-implemented priority queue

Explain the process of insertion into a heap-implemented priority queue, and informally explain its complexity and the process of removal from a heap-implemented priority queue, and informally explain its complexity.

  Discuss and define complex data binding

Discuss and define complex data binding and what benefits can this capability lend to a multiple table database application?

  Modify bellman ford algorithm to find negative weight cycle

Demonstrate how to modify the Bellman Ford algorithm to find and print a negative weight cycle in a weighted directed graph G if one exists.

  Write algorithm to create job applicant report

Write the algorithm to create job applicant report. Input consists of a series of records that contain the Social Security number or equivalent, last name, first name, middle initial.

  Write recursive version of array-based linear search

Write an algorithm but not code. Write a recursive version of the array-based linear search algorithm. Write a recursive version of the linked-list-based linear search algorithm."""

  Question about trigger

What are triggers used for, and why are they important in database systems? Give an example of a situation where a trigger would be appropriate.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd