Difference among a primary index and a secondary index, Database Management System

Assignment Help:

What is the difference among a primary index and a secondary index?

Primary Index: A primary index is an ordered file whose records are of fixed length along with two fields. The first field is the ordering key field-known as primary key-of the data file, and the second field is a pointer to a disk block. There is one index entry in the index file for every block in the data file. Each index entry has the value of the primary key field for the first record within a block and a pointer to in which block as its two field values. A major problem along with a primary index is insertion and deletion of records. If we attempt to insert a record in its right positioning the data file, we have to not only move records to make space for the latest record but also change a few index entries.

Secondary Index: A secondary index is also an ordered file along with two fields. The first field is non-ordering field of the data file in which is an indexing field. The second field is either a block pointer or a record pointer. A secondary index on a candidate key looks just such as a dense primary index, except in which the records pointed to through successive values in the index are not stored sequentially.

 


Related Discussions:- Difference among a primary index and a secondary index

Non-query optimisations, Part: Recommended (Non-query) Optimisations Thi...

Part: Recommended (Non-query) Optimisations This section entitled "Recommended (non-query) optimisations" should be a brief report containing recommended optimisations you would

Define the immediate update, Define the Immediate Update The immediate...

Define the Immediate Update The immediate update methods may apply changes to the database on disk before the transaction arrives a successful conclusion. Though, these change

What does authentication refer, What does authentication refer? Authent...

What does authentication refer? Authentication refers to the task of verifying the uniqueness of a person.

Create a database schema, Consider a database schema consisting of four rel...

Consider a database schema consisting of four relations, whose schemas are: Product (maker, model, type) PC (model, speed, ram, hd, price) Laptop (model, speed, ram, hd, s

Give the limitations of sql authorization, Give the limitations of SQL auth...

Give the limitations of SQL authorization. The code for checking authorization becomes intermixed with the rest of the application code. Implementing authorization by applic

Draw the E/R diagrams, for the following business rules . Identify all enti...

for the following business rules . Identify all entities, attributes, relationships, primary keys, cardinalities and constraints where appropriate 3. (9) An art museum owns a larg

What do you mean by atomicity and aggregation, What do you mean by atomicit...

What do you mean by atomicity and aggregation? Atomicity : Either all actions are carried out or none are. Users should not have to worry about the effect of incomplete trans

What is repository?, Problem 1 Why are the operational system keys not ...

Problem 1 Why are the operational system keys not recommended for forming data warehouse primary keys? Give any two examples 2 Explain the following performance tuning techn

HIT, Meaningful use refers to the use of certified EHR technology to "enhan...

Meaningful use refers to the use of certified EHR technology to "enhance quality, efficiency, and reduce health disparities

#cursor, #what is cursor its uses ? Explain it

#what is cursor its uses ? Explain it

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd