Discuss the method for a hash file to expand shrink dynamic, Database Management System

Assignment Help:

Discuss the methods for a hash file to expand and shrink dynamically. What are the advantages and disadvantages of each?

The hashing methods that permit dyanamic file expansion are:

(i) Extendible hashing
(ii) Linear hashing

The major advantage of extendible hashing that makes it attractive is that performance of the file does not degrade as the file grows. Also, no space is allocated in extendible hashing for future growth, but additional buckets can be allocated dynamically as needed.

A disadvantage is in which the directory must be searched before accessing the buckets themselves, resulting in two blocks accesses on the other hand of one in static hashing.


Related Discussions:- Discuss the method for a hash file to expand shrink dynamic

What is the use of sub queries, What is the use of sub queries? A sub q...

What is the use of sub queries? A sub query is a select-from-where expression that is nested with in another query. A common use of sub queries is to do tests for set membershi

Differance between internal and external schema, Differance between interna...

Differance between internal and external schema? Internal and external schema: Internal Schema • Describes the physical storage structure • Uses a physical data model External

Describe the association - design, Describe the Association: Design  ...

Describe the Association: Design  Before we describe association design let us define association "Association is set of links between two objects in the object model". It is

State the step- implement software control designer, Implementing software ...

Implementing software control To implement software control designer must redesign strategy of state event model which is present in dynamic model. There are three basic ap

Computing the closure of a set of functional dependency, What is meant by c...

What is meant by computing the closure of a set of functional dependency? The closure of F denoted by F + is the set of functional dependencies logically implied by F.

Which is a valid sql type, Which is a valid SQL type? A valid SQL Shoul...

Which is a valid SQL type? A valid SQL Should be in CHARACTER it is should be NUMERIC and FLOAT.

FIELDS, 4. Describe three ways to handle missing field values

4. Describe three ways to handle missing field values

Which method of access uses key transformation, Which method of access uses...

Which method of access uses key transformation? A Hash method of access uses key transformation.

Process of implementing system design in dynamic models, Process of impleme...

Process of implementing system design in dynamic models There are three essential approaches to implementing system design in dynamic models. These approaches are as below:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd