Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Example - ALTER TABLE emp MODIFY (empno NUMBER (7));
What is a Phantom Deadlock? In distributed deadlock detection, the delay in propagating local information might cause the deadlock detection algorithms to recognize deadlocks
Describe the four main ways of optimising disk block access. Ans: a. Disk b. Non-volatile writes buffers c. File organization (Clustering) d. Log-based file system
Define lock? Lock is the most common used to execute the requirement is to permit a transaction to access a data item only if it is currently holding a lock on that item.
What are the technique to define a schema completely ? A schema is completely define by DDL and DML query language.
The definition of the classes and operation can often be adjusted to increase the amount of inheritance". Justify the above statement. Adjustment of Inheritance The def
ER diagram on cosmetics
What is vertical fragmentation? Vertical fragmentation divides the relation by decomposing the scheme R of relation r.
Indexed (Indexed Sequential) File Organisation It organises the file like a big dictionary, i.e., records are kept in order of the key but an index is stored which also allows
DROP TABLE Command: When an existing object is not needed for further use, it is always better to eliminate it from the database. To remove the existing object from the databas
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd