Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
An employee record has the following structure struct employee { int eno; char name[22]; float salary; char dept[10];};(i) Calculate the record size R in bytes.(ii) If the file has 500 records, calculate the blocking factor bfr and the number of blocks b, assuming an unspanned organization with block size B = 512 bytes.(iii) Describe the unused space in each block and in the last block?
Ans: (i) 2 + 22+ 4 + 10 =38 bytes (ii) bfr = floor( B/R) = [512/38] =13 Number of blocks b = ceiling (500/13) =39 (iii) Unused space in each block = 512 - 38 *13 = 512 - 494= 18 bytes Unused space in the last block = ( 39 *13 - 500) * 38 bytes = (507 -500) * 38 bytes = 7 * 38 =266 bytes
under what condition log based recovery is feasible?
Database design Database tables will be created for you on the Technology web server. The schema will be as follows. Please note that this is a simplified database structure, d
Problem 1. Describe the following a) Advantages of Database Systems b) Functions of a DBMS Explanation of part (a) and (b) 2. Explain the following concepts w
3 assignments combined in 1
Lack of Redundancy We have talked about the problems of repetition of information in a database. Such repetition should be stay away as much as possible. Let us state once again t
What does the extract statement do in extract datasets? The data is written to virtual memory by extract commands.
Explain Data Dictionary in short?
List the Armstrong's axioms for functional dependencies. What do you understand by soundness and completeness of these axioms? Ans: The Armstrong's axioms are: F1:
Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm
List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd