Which method is used to key transformation, Database Management System

Assignment Help:

Which method is used to key transformation ?

A hash method is used to key transformation.

 


Related Discussions:- Which method is used to key transformation

Schema, difference between internal schema and external schema in DBMS

difference between internal schema and external schema in DBMS

Descrine an data dictionary, Describe an data dictionary? A data dictio...

Describe an data dictionary? A data dictionary is a data structure which keeps meta data about the structure of the database ie. the schema of the database.

What is data model, A Data Model in software engineering is an abstract...

A Data Model in software engineering is an abstract model that organizes and documents the business data for interaction between team members and is used as a plan for creating

What is dag, What is DAG? The class-subclass relationship is shown by a...

What is DAG? The class-subclass relationship is shown by a directed acyclic graph.eg: employees can be temporary or permanent. We might be create subclasses temporary \and perm

Illustrate the view of software architecture, Illustrate the view of softwa...

Illustrate the view of software architecture A model is a semantically closed abstraction of system composes of elements. It can be visualized using any of the following five v

Explain in detail about collaboration diagrams, Explain in detail about Col...

Explain in detail about Collaboration Diagrams Collaboration diagrams are interaction diagrams which emphasize structural organisation of an object that transmit and receive m

What are the comparison operator in sql, What are the comparison operator i...

What are the comparison operator in SQL?  Comparison operator in SQL are =, LIKE and BETWEEN

What is meant by log-based recovery, What is meant by log-based recovery? ...

What is meant by log-based recovery? The most widely used structures for recording database changes is the log. The log is a sequence of log records, recording all the update a

Types of locks, Types of Locks There are two necessary types of locks: ...

Types of Locks There are two necessary types of locks: Binary lock : This locking mechanism has two states for to a data item: locked or unlocked Multiple-mode loc

Determine that the checkpoints are a part of, 1. Determine that the Checkpo...

1. Determine that the Checkpoints are a part of  Ans: Checkpoints are a part of Recovery measures

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd