Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
An employee record has the following structure struct employee { int eno; char name[22]; float salary; char dept[10];};(i) Calculate the record size R in bytes.(ii) If the file has 500 records, calculate the blocking factor bfr and the number of blocks b, assuming an unspanned organization with block size B = 512 bytes.(iii) Describe the unused space in each block and in the last block?
Ans: (i) 2 + 22+ 4 + 10 =38 bytes (ii) bfr = floor( B/R) = [512/38] =13 Number of blocks b = ceiling (500/13) =39 (iii) Unused space in each block = 512 - 38 *13 = 512 - 494= 18 bytes Unused space in the last block = ( 39 *13 - 500) * 38 bytes = (507 -500) * 38 bytes = 7 * 38 =266 bytes
For every multivalued attribute 'A', we make a new relation R that contains an attribute corresponding to plus the primary key attribute k of the relation that shows the entity typ
What is the main goal of RAID technology? Describe the levels 1 through 5. RAID stands for Redundant Array of Inexpensive (or sometimes "Independent")Disks. RAID is a met
Explain the three data models namely relational, network and hierarchical and evaluate their relative advantages and disadvantages. Hierarchical Model: In hierarchical model, da
Project Description: Oracle Certified Professional with 20 years of practice, Oracle version 6.0.34, 7.3, 8.0, 8i, 9i, 10G, 11G, 12C. Crossplatform migration, Informix, MSSql
Project Description: We have an encrypted HSQL Database which we want to change into csv format. HSQL DB . We have java application (jar file) which reads that database but n
Question: (a) What are decision support systems, and what role do they play in the business environment? (b) Data mining is a knowledge discovery process of automated extr
Give the limitations of SQL authorization. The code for checking authorization becomes intermixed with the rest of the application code. Implementing authorization by applic
Deadlock And Its Prevention: As seen earlier, though two phase locking protocol handles the trouble of serialisability, but it causes some troubles also. For instance, consider th
triggering
what is relationship inheritance and attribute inheritance
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd