Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain differance between Primary and secondary storage ?
Computer storage is classified within primary(main) memory and secondary(peripheral) storage.a) Primary storage is commonly RAM; ~10ns access timeb) Secondary storage is commonly hard disk drives; ~10ms access timec) Secondary storage is a lot cheaper than primary, 3¢/Mb vs.$1/Mb.
a) Databases are stored in secondary memory, and large databases are manipulated in secondary storage.b) We required minimising disk accesses while accessing and manipulating databases.
If R1 and R2 are two relations or functions, then the result of R3 = R1 × R2 is the combination of tuples that are in R1 and R2. The product is associative and commutative. Degr
What are the failures of Controlling Events Between Objects Failure Unintentional termination of system. Several possible causes: failure of system hardware, o
Consider the table student and list names of students in the departments other than maths and computer. SELECT std_name FRM student WHERE dept_name NOT IN (‘Maths','Computer);
This assignment concerns the Research database. The database ER model is shown above, where attributes are omitted for clarity. The relational model for the database is: Departm
explain three types of internet risks to the consummers whent he business system is data dependent. how can we minimise these risks
What is the use of RAID? A variety of disk-organization methods, collectively called redundant arrays of independent disks are used to better the performance and reliability.
List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of
Create 1 experiment to demonstrate an aspect of query optimisation by using access-path structures (indexes), decomposition, or denormalisation. Once satisfied with your experiment
When is UPDATE_STATISTICS command used? - When processing of large data is done, this command is used. - Whenever large number of modification, deletions or copy takes place
Attributes that are directly kept in the data base. For example, 'Birth date' attribute of a person. Derived Attributes that are not stored directly but can be derived
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd