Explain differance between primary and secondary storage, Database Management System

Assignment Help:

Explain differance between Primary and secondary storage ?

  • Primary and secondary storage

Computer storage is classified within primary(main) memory and secondary(peripheral) storage.
a) Primary storage is commonly RAM; ~10ns access time
b) Secondary storage is commonly hard disk drives; ~10ms access time
c) Secondary storage is a lot cheaper than primary, 3¢/Mb vs.$1/Mb.

  • Secondary storage is persistent

a) Databases are stored in secondary memory, and large databases are manipulated in secondary storage.
b) We required minimising disk accesses while accessing and manipulating databases.


Related Discussions:- Explain differance between primary and secondary storage

Trigger , Flights(FlightNo, DeptDateTime, Origin, ArrivalDateTime, Destinat...

Flights(FlightNo, DeptDateTime, Origin, ArrivalDateTime, Destination, Capacity, SoldSeats) Tickets(FlightNo, Seat, CustID) Where - flightNo is the PK of the flights table - DeptDa

Customer service, as a customer service employee, explain five measures you...

as a customer service employee, explain five measures you would recommend a displeased student to patronise a school canteen

How does the system cope up with a record crash, How does the system cope u...

How does the system cope up with a record crash when recovery is going on after the first crash? Ans:  In a system the undo and redo operations are needed to be idempotent to c

Keys - relational database integrity, Candidate Key:  In a relation R, a ca...

Candidate Key:  In a relation R, a candidate key for R is a subset of the set of attributes of R, which have the differnt two properties: (1)        Uniqueness:                N

What is rigorous two phase locking protocol, Differentiate strict two phase...

Differentiate strict two phase locking protocol and rigorous two phase locking protocol. In strict two phase locking protocol all exclusive mode locks taken by a transaction is

BOGUS VS GENUINE EMPOWERMENT, what is bogus empowerment. And what is genuin...

what is bogus empowerment. And what is genuine empowerment

Naïve bayesian approach-id3 algorithm, You are working for the ABC Telecom ...

You are working for the ABC Telecom and are given some customer records for data mining. You are asked to discover, from the data, patterns that characterize low-, medium- and high

What is a hashing function, What is a hashing function?  What are the prope...

What is a hashing function?  What are the properties of a good hashing function?  Describe the folding technique for hashing functions.      Ans:  Hashing function is a method

Define the terms entity set and relationship set, Define the terms i) Entit...

Define the terms i) Entity set ii) Relationship set Entity set: The set of all entities of the similar type is termed as an entity set. Relationship set: The set of all rela

Illustrate the fifth normal form, Fifth Normal Form (5NF) These relatio...

Fifth Normal Form (5NF) These relations still have a difficulty. While defining the 4NF we mentioned that all the attributes depend upon each other. Whereas creating the two ta

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd