Calculate the record size r in bytes, Database Management System

Assignment Help:

An employee record has the following structure
struct employee {
int eno;
char name[22];
float salary;
char dept[10];};
(i) Calculate the record size R in bytes.
(ii) If the file has 500 records, calculate the blocking factor bfr and the number of blocks b, assuming an unspanned organization with block size B = 512 bytes.
(iii) Describe the unused space in each block and in the last block?

Ans: (i) 2 + 22+ 4 + 10 =38 bytes
(ii) bfr = floor( B/R) = [512/38] =13
Number of blocks b = ceiling (500/13) =39
(iii) Unused space in each block
= 512 - 38 *13 = 512 - 494= 18 bytes
Unused space in the last block
= ( 39 *13 - 500) * 38 bytes = (507 -500) * 38 bytes
= 7 * 38 =266 bytes


Related Discussions:- Calculate the record size r in bytes

Log based recovery, under what condition log based recovery is feasible?

under what condition log based recovery is feasible?

Create a technology web server, Database design Database tables will be...

Database design Database tables will be created for you on the Technology web server. The schema will be as follows. Please note that this is a simplified database structure, d

Advantages of database systems, Problem 1. Describe the following a)...

Problem 1. Describe the following a) Advantages of Database Systems b) Functions of a DBMS Explanation of part (a) and (b) 2. Explain the following concepts w

Lack of redundancy, Lack of Redundancy We have talked about the problems o...

Lack of Redundancy We have talked about the problems of repetition of information in a database. Such repetition should be stay away as much as possible. Let us state once again t

The extract statement do in extract datasets, What does the extract stateme...

What does the extract statement do in extract datasets? The data is written to virtual memory by extract commands.

List the armstrong axioms for functional dependencies, List the Armstrong's...

List the Armstrong's axioms for functional dependencies.  What do you understand by soundness and completeness of these axioms?      Ans: The Armstrong's axioms are: F1:

Security-data fragmentation, Security: Data not needed by local applicatio...

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd