Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
User error: This contains errors in the program (e.g., Logical errors) with errors made by online users of database. These types of errors can be avoided by applying some check situations in programs or by limiting the access rights of online users' example, read only. So only updating or insertion operation needs appropriate check routines that perform appropriate checks on the data being modified or entered. In case of an error, some prompts can be passed to user to enable him/her to accurate that error.
Cardinality shows the number of instances of an entity associated with another entity participating in a relationship. Depend on the cardinality binary relationship can be further
Describe disk manager and their work? Disk Manager: Responsible for fetching data regulated through file Manager from disk storage within Main memory and deciding what data to
Information about films holds information about movies, stars and studios. Movies have a title, year of production, length and the film type. Stars have a name and address. Studi
What are audit trails? An audit trail is a log of all alters to the database along with information like which user performed the change and when the alter was performed.
describe objectivde of file organisation
Describe the four main ways of optimising disk block access. Ans: a. Disk b. Non-volatile writes buffers c. File organization (Clustering) d. Log-based file system
Briefly explain the state diagram by taking one example. State Diagram - An object can be given a sequence of input instructions. The state of the object can vary depending u
How do you find the final model after iterative analysis? Why is iterative analysis of any of the problem needed? The final model serves as the base for system architectur
Explain Candidate Key and Super Key A super key is a set of one or more than attributes that, taken collectively, permits us to identify uniquely a tuple in the relation. Wher
Define the Two Phase Locking Protocol This is a protocol that is used to make sure serializability of transactions. This protocol needs that every transaction issue lock and u
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd