Explain hashing techniques, Database Management System

Assignment Help:

Explain Hashing techniques

The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with one primary page and probably additional overflow pages per bucket. A file contains buckets 0 through N-1, with one primary page per bucket basically and additional overflow pages chained with bucket, if needed later. Buckets consist of data entries (or data records). A main drawback of the static hashing is that the hash address space is fixed. Therefore, it is hard to expand or shrink the file dynamically.


Related Discussions:- Explain hashing techniques

Define a property that is not a property of transactions, Define a property...

Define a property that is not a property of transactions? Ans: Concurrency is not a property of transactions

Joins, how can apply joins on table

how can apply joins on table

What are the various properties of relational tables, What are the various ...

What are the various properties of Relational tables? Relational tables have 6 properties: 1. Each row is unique. 2. Column values are of the same kind. 3. Values are

Difference between left outer join and right outer join, Difference between...

Difference between LEFT OUTER JOIN and RIGHT OUTER JOIN In left outer join tuples from the left-hand-side relation which do not match any tuple in the right-hand-side relation

What was the method in which records are physically stored, What was the me...

What was the method in which records are physically stored in a specified order according to a key field in each record ? A method in which records are physically stored within

Information infrasture, what benefit can a company gain by managing its own...

what benefit can a company gain by managing its own infrasture and services

Example of grant create session to mca12, Example -GRANT CREATE SESSION TO ...

Example -GRANT CREATE SESSION TO MCA12; (This command gives system level permission on creating a session - not portable) GRANT SELECT ON EMP TO MCA12; (Object level permi

What are deadlocks, What are deadlocks?  How can they be avoided?  Ans:...

What are deadlocks?  How can they be avoided?  Ans: Deadlock considers to a particular condition when two or more processes are every waiting for another to release a resource,

Hierarchical model is also known by, Hierarchical model is also known by? ...

Hierarchical model is also known by? A hierarchical model is also known as a Tree structure.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd