Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Define Hash files organization
a. Hashing includes computing the address of a data item by calculating a function on the search key value.
b. A hash function h is a function from the set of all search key values K to the set of all bucket addresses B.
We select a number of buckets to correspond to the number of search key values we will comprise stored in the database.
To carry out a lookup on a search key value Ki, we calculate hki, and search the bucket along with that address.
If two search keys i and j map to similar address, as h(Ki)=h(Kj), after that the bucket at the address acquired will consist of records with both search key values.
In this case we will have to verify the search key value of each record in the bucket to get the ones we want.
let us consider a table having 2200 records and the fixed size of the table to be considered as 25.then how many numbers of table is requredto perform horizontal fragmentation
Consider the join of a relation R with relation S. If R has m tuples and S has n tuples, then the maximum size of join is: If R has m tuples and S has n tuples then maximum siz
Differentiate between strict two-phase and rigorous two-phase with conversion protocol Ans: Strict two-phase locking holds all its exclusive that is write locks until commit t
Mention the various user privileges All privileges directly granted to the user or role. All privileges granted to roles that have been granted to the user or role.
Which operation is used if we are interested in only certain columns of a table? PROJECTION operation is used if we are interested in only certain columns of a table.
What does conceptual design work? A conceptual design involves modelling independent of the DBMS.
What is Foreign Key Foreign Key: Sometimes we may have to work with an attribute that does not have a primary key of its own. To recognize its rows, we have to use the primar
Consider the following database schema: STAFF(StaffNo, fName, lName, Position, sex, dob, branchNo) BRANCH(BranchNo, Street, City) Assume the following for the above database
Benefits and limitations
differences between a classified catalog and a dictionary catalog
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd