What is secondary index, Database Management System

Assignment Help:

What is Secondary Index

While making the index, generally the index table is kept in the primary memory (RAM) and the main table, because of its size is keeps in the secondary memory (Hard Disk). Theoretically, a table may have millions of records (as the telephone directory of a large city), for which even a sparse index becomes so large in size that we cannot keep it in the primary memory. And if we cannot keep the index in the primary memory, then we lose the benefit of the speed of access. For very large table, it is better to classify the index in multiple levels.

 


Related Discussions:- What is secondary index

What are segments in oracle, What are segments in oracle? Segments - Ea...

What are segments in oracle? Segments - Each table has single field of disk space, known as segment, set aside for it in the tablespace. Segments consist of contiguous sections

Stored and derived attributes, Attributes that are directly kept in the dat...

Attributes that are directly kept in the data base. For example, 'Birth date' attribute of a person.   Derived  Attributes that are not stored directly but can be derived

Introduction to Database Design and Development, Every School has many teac...

Every School has many teachers and many students. Each student is assigned to one school and each teacher works for one school only. Each teacher teaches more than one subject but

Frequecy count, how to calculate frequency count of algorithm

how to calculate frequency count of algorithm

Describe in brief about object oriented design, Describe about Object orien...

Describe about Object oriented design Object oriented design is concerned with developing an object oriented model of a software system to implement known requirements. Many OO

Objectives-database recovery and security, Objectives Define the te...

Objectives Define the terms RECOVERY and INTEGRITY; Define Recovery Techniques; Explain Error and Error detection techniques, and Define types of Authorisation.

Which method of access uses key transformation, Which method of access uses...

Which method of access uses key transformation? A Hash method of access uses key transformation.

Deadlock prevention, Deadlock Prevention One of the easiest approaches ...

Deadlock Prevention One of the easiest approaches for avoiding a deadlock would be to obtain all the locks at the begin of the transaction. Though, this approach restricts conc

Express the properties of strings, Express the properties of Strings? ...

Express the properties of Strings? Strings can be case sensitive (or not) which can change the outcome of string operations. You can evaluate whole strings \ just part

What is E-R model, E-R Model This data model is based on real world th...

E-R Model This data model is based on real world that consists of basic objects named entities and of relationship among these objects. Entities are illustrated in a database

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd