What do you mean by persistence, Database Management System

Assignment Help:

What do you mean by persistence? How you will make your data persistent?

Persistent data is the data, which has a longer lifetime than program which has created it. Enabling the data to be stored on the permanent storage medium provides persistency. The most frequent techniques used to store data is in form of files or to make use of a back-end database system.

 


Related Discussions:- What do you mean by persistence

Business process model, Consider a research paper submission process. The p...

Consider a research paper submission process. The process starts when an author submits a draft research paper (the paper may have up to 3 authors) to the chair of the organizing c

Describe about use case and external case in dfd, Describe about Use Case a...

Describe about Use Case and external case in DFD The processes are transformed those into the Use Case and external case in DFD has same characteristics which of an actor in O

ER diagram, Explain the conventions (relationships) for displaying an ER sc...

Explain the conventions (relationships) for displaying an ER schema as an ER diagram.

Define deadlock recovery measures, Define Deadlock recovery measures       ...

Define Deadlock recovery measures                   To recover from deadlock, the cycle in the wait-for-graph should be broken. The common technique of doing this is to rollbac

Implementation of association as an object, Implementation of association a...

Implementation of association as an object Implement as a separate association object, independent of either class, as in Figure. An association object is a group of pairs

How many types of locks are there, Depending upon the rules we have found, ...

Depending upon the rules we have found, we can classify the locks into two types. Shared Lock: A transaction might be acquiring shared lock on a data item in order to read it

List the requirements needed to design a trigger, List the requirements nee...

List the requirements needed to design a trigger. The requirements are:- Specifying when a trigger is to be implemented. State the actions to be taken when the trigger im

Two phase locking (2pl), Two Phase Locking (2PL) The two-phase locking ...

Two Phase Locking (2PL) The two-phase locking protocol having of two phases: Phase 1 : The lock acquisition phase : If a transaction T needs to read an object, it wants to

Cluster analysis project, (a) Data Mining Process : In the context of t...

(a) Data Mining Process : In the context of this cluster analysis project , and in your own words , explain how you would execute the first stage of data mining, namely the "P

What is a name, What is a Name? A user-supplied name is used for identi...

What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd