Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the Dynamic Hashing Techniques
There are two methods in it: extendible hashing - stores an access structure in addition to the file, and therefore is somewhat identical to indexing. The major difference is that the access structure is based upon the values that the result after application of the hash functions to the search field. The second one is, linear hashing - does not need additional access structures.
What are called jukebox systems? Jukebox systems have a few drives and numerous disks that can be loaded into single of the drives automatically.
What is called a query evaluation plan? A sequence of primitive operations that can be used to assess a query is a query evaluation plan or a query implementation plan.
What is foreign key? A relation schema r1 derived from an ER schema may contain among its attributes the primary key of another relation schema r2.this attribute is known as a
Q. Explain data aggregatio n and discuss different design constraints. Sol. Aggregation One limitation of the E-R model is that it cannot express relationships amon
List any two significant differences between a file processing system and a DBMS. File Processing System vs. DBMS Data Independence - Data independence is the capacity t
employee(empid,empname,dept,telno,mobno, add,sssno,tinno,WEdates,WEcomp,WEadd,WEpos,WEres) this is a employee record which is need to be normalize.the WE means work experience
what is entity in database system?
Ask q“A database will be made to store information about patients in a hospital. On arrival, each patient’s personal details (name, address, and telephone number) are recorded wher
What are the costs to be considered when a transaction has to be rolled back when recovering from deadlock? Ans: A few transaction will must rolled back (made a victim)
Create centralized relational database using bottom up method. (a) Recognize a single un-normalized relation for the above scenario. (b) Recognize the primary key for
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd