Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
An employee record has the following structure struct employee { int eno; char name[22]; float salary; char dept[10];};(i) Calculate the record size R in bytes.(ii) If the file has 500 records, calculate the blocking factor bfr and the number of blocks b, assuming an unspanned organization with block size B = 512 bytes.(iii) Describe the unused space in each block and in the last block?
Ans: (i) 2 + 22+ 4 + 10 =38 bytes (ii) bfr = floor( B/R) = [512/38] =13 Number of blocks b = ceiling (500/13) =39 (iii) Unused space in each block = 512 - 38 *13 = 512 - 494= 18 bytes Unused space in the last block = ( 39 *13 - 500) * 38 bytes = (507 -500) * 38 bytes = 7 * 38 =266 bytes
1.Suppose you are given a dataset that consists of a random sample of tasters, on which the following variables were obtained: (y) Zpref = taste preference for green beans store
Have a look around the site, and at some of the sites they have featured. These are all examples of bad design, and also offer an explanation about why they fall into this category
Sub query in the UPDATE command : Example : //Double the commission for employees, who have got at least 2 increments. UPDATE EMP SET COMM = COMM * 2 WHERE
Describe Interfaces for the DBA? Interfaces for the DBA - Most database systems holds privileged commands which could be used only through the DBA's staff. These involves com
Define the term Domain. For each n every attribute there is a set of permitted values known as the domain of that attribute.
Need for Client Server Computing- Client/Server (C/S) architecture includes running the application on multiple machines in which every machine with its component software tackles
What are the Objectives of object design After going through this unit, you could be able to: explain steps of object design; discuss algorithms that reduce costs;
Illustrate the view of software architecture A model is a semantically closed abstraction of system composes of elements. It can be visualized using any of the following five v
1. Based on the dependency diagram, create a database whose tables are in at least 2NF, showing the dependency diagram for each table (as shown in class). Label the types of depe
What are the different integrity constraints in RDBMS? The various integrity constraints in RDBMS are as: Primary Key: primary key is a grouping of one or more attributes
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd