Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Representing complex relationship among data
A database may contain varieties of data interrelated to each other in numerous ways. A DBMS must have the capability to represent a variety of relationships between the data as well as to update and retrieve related data simply and efficiently.
Improved Security
Data is essential to any organisation and also confidential. In a shared system the multiple users share the data, all information has not been shared by all users. For instance, the salary of the employees has not been visible to anyone other than the department dealing in this. Therefore, database should be protected from unauthorised users. This is done by Database Administrator (DBA) by giving the usernames and passwords only to authorised users as well as granting privileges or the type of operation allowed. This is complete by using security and authorisation subsystem. Only authorised clients may use the database and their access types can be restricted to only retrieval, update, insert or delete or any of these. Let us take example; the Branch Manager of any company may have access to all data while the Sales Assistant may not have access to salary details.
Improved Backup and Recovery
A file-based system may fail to give measures to protect data from system failures. This lies only on the user by taking backups intermittently. DBMS gives facilities for recovering the hardware and software failures. A recovery and backup subsystem is liable for this. In case a program fails, it restores the database to a state in which it was before the implementation of the program.
Support for concurrent transactions
A transaction is defined as the unit of work. For illustration, a bank may be there in a transaction where an amount of Rs.5000/- is transmitted from account X to account Y. A DBMS also transmit multiple transactions to occur concurrently.
Explain Candidate Key and Super Key A super key is a set of one or more than attributes that, taken collectively, permits us to identify uniquely a tuple in the relation. Wher
Define Deadlock detection If a system does not employ a few protocols that make sure deadlock freedom, after that a detection and recovery scheme should be used. An algorithm
What is recursive closure? Why is it not possible to describe this operation in relational algebra? Recursive closure is applied to recursive relationship. An instance of rec
Conflicting Operations in Schedule: The three simple ways of interleaved instruction implement of transactions T1 and T2. Please note that in the following tables the first col
Consider the following database containing five transactions. Let min_sup = 60%. Mine all frequent itemsets using Apriori and FP-growth algorithm. Compare the efficiency of the t
Explain concept of inheritance with support of suitable example. Inheritance Inheritance is one of milestone of object-oriented programming language as it allows a creati
in an organization several projects are undertaken. Each project can employ one or more employees. Each employee can work on one or more projects. Each project is undertaken on the
i need help with creating database system for a library
What is a hash index? A hash index organizes the search keys, with their associated pointers, into a hash file structure.
What is serializability? Explain its types? The data base system must control concurrent implementation of transactions, to ensure that the data base state remains consistent.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd