Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the uses of ODBC? Under what circumstances we use this technology?
ODBC expose database capabilities within a standardized way to the application programmer by an application programming interface (API). In difference to Embedded SQL, ODBC permits a single executable to access various DBMSs without recompilation. Therefore, although Embedded SQL is DBMS- independent just at the source code level, applications using ODBC are DBMS- independent at the source code stages and at the level of the executable.
All direct interaction along with a exact DBMS happens by a DBMS-specific driver. A driver is a software program which translates the ODBC calls within DBMS-specific calls. Drivers are loaded dynamically on demand because the DBMSs the application is going to access are known just at run-time. Available drivers are registered along with a driver manager. The driver translates the SQL commands from the application within equivalent commands in which the DBMS understands. An application which interacts along with a data source by ODBC selects a data source, dynamically loads the corresponding driver, and establishes a connection along with the data source. ODBC achieves portability at the stages of the executable through introducing an extra level of indirection. Further, using ODBC, an application could access not only one DBMS but several various ones simultaneously.
What is known as heap file organization? In the heap file organization, any record can be placed anywhere in the file where there is space for the record. There is no ordering
Java program for horrizontal fragmentation in distributed database
What is Foreign Key Foreign Key: Sometimes we may have to work with an attribute that does not have a primary key of its own. To recognize its rows, we have to use the primar
Give the two reasons for allowing concurrency
Explain Authorization and Integrity Manager ? Authorization and Integrity Manager: Tests for the satisfaction of integrity constraints and checks the authority of users to acce
About Attribute inheritance
Define average seek time. The average seek time is the average of the seek times, calculated over a sequence of random requests.
Explain what is Aggregation ? Aggregation: This is used whenever we intend to show a relationship between an entity and the relationship. There is no provision for this in th
What is a hashing function? What are the properties of a good hashing function? Describe the folding technique for hashing functions. Ans: Hashing function is a method
Database Manager It is the interface among low-level data, queries and application programs. Databases typically need a large amount of storage space. It is kept on disks, as
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd