Explain data independence, Database Management System

Assignment Help:

Explain data independence ?

Data independence is the capacity to modify the schema at one stage of a database system without having to change the schema at the further level. The three-schema architecture permits the feature of data independence. Data independence occurs since while the schema is changed at a few level, the schema at the further level remains unchanged; only the mapping among the two levels is changed.


Related Discussions:- Explain data independence

What is assertion, What is assertion? Mention the forms available. An a...

What is assertion? Mention the forms available. An assertion is a predicate expressing a condition that we wish the database always to satisfy. Domain integrity constraints.

Triggers and Stored Procedures, 10A.53 Code an Oracle Database trigger to e...

10A.53 Code an Oracle Database trigger to enforce the constraint that an employee can never change his or her department. 10A.54 Code an Oracle Database trigger to allow the delet

What are the types of reference, What are the types of reference?explain it...

What are the types of reference?explain it with suitable examples? Object oriented language given the ability to refer the object attribute of the type can be referred to the s

Information Technology, What benefits can a company gain by managing its ow...

What benefits can a company gain by managing its own information infrastructure and servicea

Data Minnning, Can i get help with weka software

Can i get help with weka software

Data base design, how to design a bakery business in data base

how to design a bakery business in data base

What are the factors into account when choosing a raid level, What are the ...

What are the factors to be taken into account when choosing a RAID level? A) Monetary cost of extra disk storage requirements. B) Performance requirements in terms of number

Which method of access uses key transformation, Which method of access uses...

Which method of access uses key transformation? A Hash method of access uses key transformation.

Business process model, Consider a research paper submission process. The p...

Consider a research paper submission process. The process starts when an author submits a draft research paper (the paper may have up to 3 authors) to the chair of the organizing c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd