There are two major types of fragmentation, Database Management System

There are two major types of fragmentation: Horizontal& Vertical. Horizontal fragments, as the name suggests are subsets of tuples and vertical fragments are subsets of attributes (refer to Figure ).

                   2330_There are two major types of fragmentation.png

                                                    Figure: Horizontal and Vertical Fragmentation

Posted Date: 3/13/2013 8:37:19 AM | Location : United States







Related Discussions:- There are two major types of fragmentation, Assignment Help, Ask Question on There are two major types of fragmentation, Get Answer, Expert's Help, There are two major types of fragmentation Discussions

Write discussion on There are two major types of fragmentation
Your posts are moderated
Related Questions
Problem 1. Describe the Oracle Architecture with a neat labeled diagram, Also explain the individual components of the Architecture. 2. Write about the following Oracle 9i o

What are partial, alternate,, artificial, compound and natural key? Partial Key: It is a set of attributes that can uniquely recognize weak entities and that are related to s

Hi is anyone well versed in accounting information systems available now to help me work through an important assignment due tomorrow at noon?

Change the city of First Bank Corporation to ‘New Delhi' UPDATE COMPANY SET CITY = ‘New Delhi' WHERE COMPANY_NAME = ‘First Bank Corporation';

Before defines the second type of integrity constraint, viz., Entity Integrity, we should be well-known with the concept of NULL. Mostly, NULL is intended as a basis for dealing

let us consider a table having 2200 records and the fixed size of the table to be considered as 25.then how many numbers of table is requredto perform horizontal fragmentation

Consider the E/R schema with weak entity sets shown below. Come up with the SQL CREATE TABLE statements (with appropriate primary key, unique and foreign key constraints). Include

Availability: A site having the copy of a replicated relation fails, even then the relation may be found in another site. Therefore, the system may carry on to process at least th

State as Location within a Program In this traditional approach, location of control inside a program totally defines the program state. Any finite state machine may be implem