Describe the storage structure of indexed sequential files, Database Management System

Assignment Help:

Describe the storage structure of indexed sequential files and their access method. 

Ans:   Storage structure of Indexed Sequential files and their access: To achieve fast random access to records in a file, we can utilize an index structure. An index record contains a search key value and pointers to data records that is related with a specific search key. An ordered index stores the values of the search keys in sorted order. A file may have various indices on different search keys. If the files consisting of the records are sequentially ordered, a primary index is an index whose search key also describes the sequential order of the file. Such types of files are termed as index sequential files. There are two sorts of ordered indices: dense and sparse. In dense index, and index record appears only for a few of the search-key in the files as displayed below.

2288_Describe the storage structure of indexed sequential files and their access method.png

To access a specific record with search key value, K, by using dense index we search index record along with search key value, K, by which reach the first entry of data record along with search key value K. After that the data records are searched linearly to acquire the required record. If either the index record is not there or the linear search arrive the data record with different search key value, then the record is not there. Here now for sparse index, we search index record along with search key value, K or the index record with highest search key value less as compared to K, from which arrives the first entry of data record with search key value K or highest value less than K. After that the data records are searched linearly to acquire the required record. If the linear searches the data record with search key value greater as compared to K, then the record is not there.


Related Discussions:- Describe the storage structure of indexed sequential files

Query by example, Illustrate how you can use QBE to perform logical AND and...

Illustrate how you can use QBE to perform logical AND and OR operation

Windows 8 Administrative Tools, Which two tools are used to administer user...

Which two tools are used to administer users for Active Directory?

Introduction to database technology, 1. Create the tables for the play-sche...

1. Create the tables for the play-scheme database as specified in the TMA. 2. Enter the data as given in the spreadsheet. 3. Create queries to retrieve specified information

Which operator is cartesian product in relational algebra, Which operator i...

Which operator is Cartesian product in relational algebra? Cartesian product in relational algebra is a binary operator. (It requires two operands. e.g., P X Q)

What is index, What is Index? An index is a physical structure having p...

What is Index? An index is a physical structure having pointers to the data. Indices are created in an existing table to locate rows more quickly and efficiently. It is possibl

B2b business uk database, We have a new website where I need someone to 1: ...

We have a new website where I need someone to 1: Inhabit the back end with all the recruitment agencies in the UK. I require someone who is not manually going to do this, but who w

Relational constraints, Relational and E-R Model There are three types o...

Relational and E-R Model There are three types of constraints on relational database that have: DOMAIN CONSTRAINT PRIMARY KEY CONSTRAINT INTEGRITY CONSTRAINT

Having clause-data manipulation language, Having clause This clause...

Having clause This clause is used for producing conditions on grouped information. Example: Find maximum salary and department number of those departments where maxim

Php optimization on iis 8, Project Description: We have purchased facebo...

Project Description: We have purchased facebook style chat software which we are using with our site. It is prepared in PHP but the rest of the site is developed asp.net. Iss

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd