Explain data independence, Database Management System

Assignment Help:

Explain data independence ?

Data independence is the capacity to modify the schema at one stage of a database system without having to change the schema at the further level. The three-schema architecture permits the feature of data independence. Data independence occurs since while the schema is changed at a few level, the schema at the further level remains unchanged; only the mapping among the two levels is changed.


Related Discussions:- Explain data independence

Organic compounds, #question.explain diversity and magnitude of organic com...

#question.explain diversity and magnitude of organic compounds and general properties?

Wound-wait scheme-deadlock prevention, " Wound-wait" scheme : It is based o...

" Wound-wait" scheme : It is based on a preemptive method. It is based on a simple rule:                   If Ti requests a database resource that is held by Tj

What are temporary tables, What are temporary tables? Temporary tables...

What are temporary tables? Temporary tables exist solely for a particular session or whose data persists for the duration of the transaction.

RDBMS, DISADVANTAGES OF RDBMS

DISADVANTAGES OF RDBMS

Need for client server computing, Need for Client Server Computing- Client/...

Need for Client Server Computing- Client/Server (C/S) architecture includes running the application on multiple machines in which every machine with its component software tackles

What is a security, What is a security? Securities are claims on financ...

What is a security? Securities are claims on financial assets.  They can be illustrated as "claim checks" which give their owners the right to receive funds in the future.  Sec

Explain the functions and components of ddbms, Question 1 Explain the conc...

Question 1 Explain the concept of database recovery management. Explain the different levels of backup used for recovering data Question 2 What are the different types of par

Which method of access uses key transformation, Which method of access uses...

Which method of access uses key transformation? A Hash method of access uses key transformation.

Cartisian product, Explain the cartesian product in Database Management Sys...

Explain the cartesian product in Database Management System

Illustrate different types of locks in sql server, Illustrate different typ...

Illustrate different types of Locks in SQL Server. There are three kinds of locks in SQL Server i.) Shared locks - These are used for operations which don't allow any update

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd