What is secondary index, Database Management System

Assignment Help:

What is Secondary Index

While making the index, generally the index table is kept in the primary memory (RAM) and the main table, because of its size is keeps in the secondary memory (Hard Disk). Theoretically, a table may have millions of records (as the telephone directory of a large city), for which even a sparse index becomes so large in size that we cannot keep it in the primary memory. And if we cannot keep the index in the primary memory, then we lose the benefit of the speed of access. For very large table, it is better to classify the index in multiple levels.

 


Related Discussions:- What is secondary index

Name the various privileges in sql, Name the various privileges in SQL? ...

Name the various privileges in SQL? A) Delete B) Select C) Insert D) Update

Fds in relationships and teaches relationship, FDs in Relationships:  E...

FDs in Relationships:  Enrols Relationship: None as it is many to many Teaches Relationship : Course code → Instructor Instructor → Course code The next question is:

What are uncommitted modifications, What are uncommitted modifications? ...

What are uncommitted modifications? The immediate-modification technique permits database modifications to be output to the database whereas the transaction is still in the act

Intersection, If R1 and R2 are two union compatible relations or functions,...

If R1 and R2 are two union compatible relations or functions, then the result of R3 = R1 ∩R2 is the relation that contains all tuples that are in both the relations In other words,

Failure controlling methods, Failure Controlling Methods: Failures can be h...

Failure Controlling Methods: Failures can be handled using different recovery methods that are talk about later in the unit. But the first question is doing we really require recov

Mr.dattu, Define a job scheduling strategy that will meet business requirem...

Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pictori

Explain different addressing modes of 8086, 1. Explain different addressing...

1. Explain different addressing modes of 8086 Explanation of all addressing modes 2. Write a sequence of instructions to exchange two register contents using stack

Super keys, A super key is an attribute or set of attributes used to recogn...

A super key is an attribute or set of attributes used to recognize the records uniquely in a relation. For instance, in the Relation PERSON defines earlier PERSON_ID is a super

Traffic data management, This report identifies and outlines my CIS 499 pro...

This report identifies and outlines my CIS 499 project named Traffic Data Management  Systems (TDMS) .   My goal is to design a replica of all traffic issues to be implemented i

Shared lock or read lock, Shared lock or Read Lock It is requested ...

Shared lock or Read Lock It is requested by a transaction that needs to just read the value of data item. A shared lock on a data item does not permit an exclusive lock

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd