Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the disadvantages of using DBMS
There could be a few disadvantages of using DBMS.
As DBMS requires computers, we have to invest a good amount in acquiring the hardware, software, installation facilities and training of users.
We have to keep regular backups because a failure can happen any time. Taking backup is a lengthy process and the computer system cannot perform any other job at this time.
Whereas data security system is a boon for using DBMS, it must be very robust. If someone can bypass the security system then the database would become open to any type of mishandling
What is vertical fragmentation? Vertical fragmentation divides the relation by decomposing the scheme R of relation r.
Define Deadlock detection If a system does not employ a few protocols that make sure deadlock freedom, after that a detection and recovery scheme should be used. An algorithm
Differentiate between a Global and a Local temporary table? - A local temporary table exists only for the duration of a connection or if defined inside a compound statement, fo
What is OMR? OMR (Optical Mark Recognition) is the translation of marks - or the absence of marks - but not the shape of the mark on forms that have small circles ("also called
State about the Use Case Diagram A use case diagram represents a set of use cases, actors and their relationships. These diagrams shall be used to model context or requirement
State the data flow diagram of functional model Any action initiated by transition in the state diagram can be extended into an entire data flow diagram in functional model. Th
Which is an advantage of view? The Advantages of view is Data security, Derived columns and Hiding of complex queries
Describe about Use Case and external case in DFD The processes are transformed those into the Use Case and external case in DFD has same characteristics which of an actor in O
What is an ERD?
Differance between Open addressing and chaining for collision resolution ? In open addressing , proceeding from the occupied position specified by hash address the program che
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd