Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain differance between Primary and secondary storage ?
Computer storage is classified within primary(main) memory and secondary(peripheral) storage.a) Primary storage is commonly RAM; ~10ns access timeb) Secondary storage is commonly hard disk drives; ~10ms access timec) Secondary storage is a lot cheaper than primary, 3¢/Mb vs.$1/Mb.
a) Databases are stored in secondary memory, and large databases are manipulated in secondary storage.b) We required minimising disk accesses while accessing and manipulating databases.
Define Join and Outer Join and differentiate between them. Ans: Join - It generates all the combinations of tuples from two relations which satisfy a join condition. Oute
What is the need of a log in a DBMS? Briefly describe the various types of records that are normally present in a log. Ans: The system log, which is generally writt
10A.53 Code an Oracle Database trigger to enforce the constraint that an employee can never change his or her department. 10A.54 Code an Oracle Database trigger to allow the
Which sorting technique is used to sort databases, whose sizes are very big? Give one such algorithm. Why do sorting techniques like quicksort, insertion sort, etc. not applied
When a function module is activated syntax checking is performed automatically. YEs, a function module is activated syntax checking.
define anomalies and different types of anomalies with example
Define the Immediate Update The immediate update methods may apply changes to the database on disk before the transaction arrives a successful conclusion. Though, these change
Hi I have got an assignment for making an er diagram for market management software can any budy help me?
" Wound-wait" scheme : It is based on a preemptive method. It is based on a simple rule: If Ti requests a database resource that is held by Tj
The following variant of the primary copy asynchronous-update replication protocol has been proposed for totally replicated systems. (a) A transaction executing at site A updat
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd