Multi-key file organisation, Database Management System

Multi-Key File Organisation

In this part, we will introduce two basic file Organisation schemes that permit records to be accessed by more than one key field, therefore, allowing multiple access paths each having a dissimilar key. These are known as multi-key file Organisations. These file organisation methods are at the heart of database execution.

There are numerous methods that have been used to execute multi-key file Organisation. Most of these methods are based on building indexes to provide direct access by the key value. Two of the commonest methods for this Organisation are:

  • Multi-list file Organisation
  • Inverted file Organisation


Let us talk about these methods in more detail. But first let us talk about the need for the Multiple access paths.



Posted Date: 3/8/2013 6:15:37 AM | Location : United States

Related Discussions:- Multi-key file organisation, Assignment Help, Ask Question on Multi-key file organisation, Get Answer, Expert's Help, Multi-key file organisation Discussions

Write discussion on Multi-key file organisation
Your posts are moderated
Related Questions
Draw an ER diagram that represents the information described below. Show all entity sets, relationship sets, primary keys, and the mapping cardinality of the relationship sets.

Define lock? Lock is the most common used to execute the requirement is to permit a transaction to access a data item only if it is currently holding a lock on that item.

What is entity in DBMS? Entity: A DBMS entity is either a thing in the modelled world or a drawing element in an ERD.

What is DML Query Langauge? Data Manipulation Language (DML) - A data manipulation language is a language in which enables users to access or manipulate data as organized throu

Need a sample of a clinic database relationships

Describe integrity constraints? Integrity Constraints - A database is just as excellent as the information stored in it, and a DBMS must therefore help avoid the entry of inc

The Locking Protocol: To manage concurrency related problems we use locking. A lock is mainly a variable that is associated with a data item in the database. A lock can be located

Creation of Indexes Automatically: When a primary key or Unique constraint is show in a table definition then a unique index is formed automatically. Manually: User can

Consider a relation s over the attributes A and B with the following characteristics: 5,000 tuples with 10 tuples per page A 2-level B+ tree index on attribute

What is recursive closure? Why is it not possible to describe this operation in relational algebra? Recursive closure is applied to recursive relationship. An instance of rec