Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Differentiate between logical database design and physical database design. Show how this separation leads to data independence?
Basis
Logical Database Design
Physical Database Design
Task
Maps or transforms the conceptual schema (or an ER schema) from the high-stages data model into a relational database schema.
The specifications for the stored database within terms of physical storage structures, record placement, and indexes are designed.
Choice of criteria
The mapping can proceed in two levels:
1. System independent mapping but data model-depending.
2. tailoring the schemas to a specific DBMS.
The following criteria are frequent used to guide the choice of physical database design option:
1. Response Time option
2. Space Utilization
3.Transaction throughout
Result
DDL statements within the language of the chosen DBMS that specify the conceptual and external stages schemas of the database system. But if the DDL statements involve a few physical design parameters, a completed DDL specification must wait until after the physical database.
An initial determination of storage structures and the access paths for the database files. This corresponds to defining the internal schema in terms of Data Storage Definition Language.
The database design is separated into various phases. The logical database design and physical database design are two of them. This separation is commonly based on the concept of three-level architecture of DBMS that gives the data independence. Therefore, we can say in which this separation leads to data independence since the output of the logical database design is the conceptual and external level schemas of the database system that is independent from the output of the physical database design which is internal schema.
Security: In a centralised system, access to the data can be simply controlled. Though, in a distributed DBMS not only does access to replicated data have to be controlled in many
What does authentication refer? Authentication refers to the task of verifying the uniqueness of a person.
please describe the data base management with the easy example &give the application?
Define check point and its impact on data base recovery. Ans: There could be hundreds of transactions handled per minute, in a large on-line database system.
What is the State Machine Engine The straightest approach to implement control is to have any way of explicitly representing and executing state machines. With the help of thi
What is a cascading update? Referential integrity constraints needs that foreign key values in one table correspond to primary key values in another. If the value of the primar
The Database Approach In order to overcome the limits of a file system, a new approach was needed. Hence a database approach emerged. A database is a persistent collection of
explain participation constraints with examples
Define canonical cover? A canonical cover Fc for F is a set of dependencies like F logically implies all dependencies in FC and Fc logically shows all dependencies in F.
What is D command work in the respect of QBE? D: It is the command inside QBE to delete tuple(s) from the relation.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd