Determine the three views of data, Database Management System

Assignment Help:

Determine the Three Views of Data

We know that the similar thing, if viewed from dissimilar angles produces difference sights. Similarly, the database that we have formed already can have different aspects to reveal if seen from dissimilar levels of abstraction. The term Abstraction is very significant here. Generally it means the amount of detail you want to hide. Any entity can be seen from dissimilar perspectives and levels of complexity to make it a reveal its current amount of abstraction.

In the same manner, the database can also be viewed from dissimilar levels of abstraction to reveal dissimilar levels of details.

 


Related Discussions:- Determine the three views of data

What is an object id, What is an object ID? Each class-derived table ha...

What is an object ID? Each class-derived table has an ID for primary key, one or more object IDs form primary key for association derived tables. An object ID is equivalent dat

What is the use of a slotted-page structure, What is the use of a slotted-p...

What is the use of a slotted-page structure and what is the information are there in the header? The slotted-page structure is used for organizing records within a one block.

Find out employee who draws salary more than average , Normal 0 ...

Normal 0 false false false EN-US X-NONE X-NONE

Data Analysis, A buyer for a large department store chain must place orders...

A buyer for a large department store chain must place orders with an athletic shoe manufacturer six months prior to the time the shoes will be sold in the department stores. In par

Advantages of data distribution, Advantages of Data Distribution The pr...

Advantages of Data Distribution The primary benefit of distributed database systems is the ability to access and share data in a reliable and efficient manner.

Hashed file organisation, Hashed File Organisation Hashing is the most ...

Hashed File Organisation Hashing is the most common form of purely random access to a database or file. It is also used to access columns that do not have an index as an optimi

Explain the togaf framework for enterprise architectures, Question: (a)...

Question: (a) With the help of a diagram, explain the TOGAF framework for enterprise architectures. (b) Where would you position enterprise architectures in an enterpri

How to deal with the authentication problem, Most computer systems authenti...

Most computer systems authenticate users by asking them for the user name and password. However, the user names and passwords often can be guessed by hackers. Suggest an automated,

Extend the database, Now that she understands more about the benefits of da...

Now that she understands more about the benefits of databases, the play-scheme manager would like to extend the play-scheme database to include data for schools and instructors as

Explain the dynamic hashing techniques, Explain the Dynamic Hashing Techniq...

Explain the Dynamic Hashing Techniques There are two methods in it: extendible hashing - stores an access structure in addition to the file, and therefore is somewhat identica

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd