Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain differance between Primary and secondary storage ?
Computer storage is classified within primary(main) memory and secondary(peripheral) storage.a) Primary storage is commonly RAM; ~10ns access timeb) Secondary storage is commonly hard disk drives; ~10ms access timec) Secondary storage is a lot cheaper than primary, 3¢/Mb vs.$1/Mb.
a) Databases are stored in secondary memory, and large databases are manipulated in secondary storage.b) We required minimising disk accesses while accessing and manipulating databases.
What are the two types of indices? The two types of indices are:- A) Dense index B) Sparse index
Define in which normalisation form if an attribute of a composite key is dependent on an attribute of other composite key. Ans: 3NF A relation is in 3 NF if an attribute of
Prepare a gantt chart for the stock control project: Scenario Lucas-TVS is the Leader in Auto Electricals in India today with 50 years experience in desig
Define shadow paging. An alternative to log-based crash recovery method is shadow paging. This technique requires fewer disk accesses than do the log-based methods.
Should I select imaging software that allows changes? An imaging system should not give features to edit or alter images. Images generally are formed as safe and secure records
Explain Superkey Ans: A superkey is described in the relational model of database organization like a set of attributes of a relation variable for which it holds that in all re
What is relationship instance ? Relationship Instance - A relationship is a relation between two or more entities. An instance of relationship set is a set of relationships.
What is system log? What are the entries? Ans: The system log that is generally written on stable storage contains the redundant data required to recover from volatile
How can we Classify the operations on classes This step fundamentally means all three models functional, object and dynamic (studied in last section) must be combined so that
Database Recovery And Security Introduction In this part we will introduce two main issues relating to database management systems. A computer system suffers from dissi
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd