Relational database management, Database Management System

For this application, we will consider IBM DB2 catalog data (i.e., metadata) for IBM's enterprise-class servers running the z/OS (formerly OS/390 or MVS) operating system.  One of the outcomes of this question is to give you some experience in actually exploring the contents of what's in an RDBMS catalog.  This will also  give us a head start in thinking about query optimization-a major part of this course.

Go to this Web site: 

SYSIBM.SYSCOLUMNS

SYSIBM.SYSCOPY

SYSIBM.SYSDATABASE

SYSIBM.SYSDBRM

SYSIBM.SYSINDEXES

SYSIBM.SYSINDEXPART

SYSIBM.SYSPLAN

SYSIBM.SYSTABLEPART

SYSIBM.SYSTABLES

SYSIBM.SYSTABLESPACE

SYSIBM.SYSTABLESPACESTATS

In this course, we will frequently encounter a program that is a crucial component of an RDBMS.  That program is called an optimizer.  It tries to determine the optimal access path when accessing (e.g., retrieving) data in a database.  An optimizer obtains statistics or metadata (i.e., data about data) from a data repository in the DBMS called a catalog.  The catalog will have information about the columns of tables and indices; the number of rows in a table; the numbers, types, and (possibly) distribution of values for columns in  the tables; and literally hundreds of other pieces of information.

Posted Date: 3/7/2013 4:40:36 AM | Location : United States







Related Discussions:- Relational database management, Assignment Help, Ask Question on Relational database management, Get Answer, Expert's Help, Relational database management Discussions

Write discussion on Relational database management
Your posts are moderated
Related Questions
A TDMS project plan is not a typical Information Technology project plan; therefore, a traffic data project has several unique characteristics: Traffic data management system

Objectives Define the terms RECOVERY and INTEGRITY; Define Recovery Techniques; Explain Error and Error detection techniques, and Define types of Authorisation.

What is use of generating such tables? How can you create temporary tables? When you require a table only for a short time after that you want it to disappear automatically you

Give the limitations of SQL authorization. The code for checking authorization becomes intermixed with the rest of the application code. Implementing authorization by applic

Gyan Gurukul is a software company that provides software related solution. Ashutosh Dubey who is the director of Gyan Gurukul want a three-level schema architecture for the Gyan G

What do you mean through integrity constraints? Integrity Constraints -An integrity constraint is a condition specified on a database schema and restricts the data in which

Update Anomaly : This anomaly is occurred due to data redundancy. Redundant information makes updates more complex since, for example, varying the name of the instructor of MCS-014


Mappings between Levels and Data Independence The 3 levels of abstraction in the database do not exist separately of each other. There must be some correspondence, or mapping

Consider an information system designed for an online company which provides IT products and services. These include desktops, laptops, networking products, IT books, parts, and te