Describe the storage structure of indexed sequential file, Database Management System

Assignment Help:

Describe the storage structure of indexed sequential files and their access method.

Ans: Index offers a lookup capability to rapidly reach the vicinity of the desired record.  

  • consists of key field and a pointer to the main file
  • Indexed is searched to find out highest key value that is equal to or precedes the desired key value
  • Search carries on in the main file at the location pointed out by the pointer.

If an index consists of 1000 entries, it will take on average 500 accesses to find out the key, followed by 500 accesses in the main file.  Now on average it is 1000 accesses.

a)      New records are added to an overflow file 

b)      Record in main file which precedes it is updated to include a pointer to the new record 

c)       The overflow is merged along with the main file during a batch update 

d)      Multiple indexes for similar key field can be set up to increase efficiency.

 ISAM that is Indexed Sequential Access Method is a file management system developed at IBM that permits records to be accessed either sequentially (in the order they were entered) or randomly (with an index). Every index defines a different ordering of the records. An employee database may have various indexes, based on the information being sought. For instance, a name index may order employees alphabetically by last name, when a department index may order employees by their department. A key is fixed in each index. For an alphabetical index of employee names, the last name field would be the key.


Related Discussions:- Describe the storage structure of indexed sequential file

Cluster analysis project, (a) Data Mining Process : In the context of t...

(a) Data Mining Process : In the context of this cluster analysis project , and in your own words , explain how you would execute the first stage of data mining, namely the "P

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

What is the object-oriented decompositions, Object-oriented decompositions ...

Object-oriented decompositions Object-oriented decompositions of systems better are able to cope with change. Each subsystem has a well-defined interface which communicates with

Assignments, i have assignments I don''t have time to finish because of wo...

i have assignments I don''t have time to finish because of work and other assignments, can you help with this? All are from the book Darabase design, application development and a

Describe analysis of access paths, Describe analysis of access paths To...

Describe analysis of access paths To describe analysis of access paths, consider an example of the design of a company's employee skills database. A part of the object model fr

File organisation and its types, File Organisation And Its Types  Just ...

File Organisation And Its Types  Just as arrays, trees, lists and other data structures are used to execute data Organisation in main memory, a number of planning's are used to

Sql insert statements, Submit SQL INSERT Statements that will populate the ...

Submit SQL INSERT Statements that will populate the database with sample data.  You must insert at least 5 records into each table in your database.Submit your SQL INSERT Statement

Define deadlock detection, Define Deadlock detection If a system does ...

Define Deadlock detection If a system does not employ a few protocols that make sure deadlock freedom, after that a detection and recovery scheme should be used. An algorithm

Descrine an data dictionary, Describe an data dictionary? A data dictio...

Describe an data dictionary? A data dictionary is a data structure which keeps meta data about the structure of the database ie. the schema of the database.

What three major types of actions includes databases, What three major type...

What three major types of actions includes databases? Briefly discuss these The three major types of actions including databases are: (i) Defining: It includes specifyin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd