Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain differance between Primary and secondary storage ?
Computer storage is classified within primary(main) memory and secondary(peripheral) storage.a) Primary storage is commonly RAM; ~10ns access timeb) Secondary storage is commonly hard disk drives; ~10ms access timec) Secondary storage is a lot cheaper than primary, 3¢/Mb vs.$1/Mb.
a) Databases are stored in secondary memory, and large databases are manipulated in secondary storage.b) We required minimising disk accesses while accessing and manipulating databases.
What is Cross Product? Simply Cross product is Binary Operator
What is conceptual schema? The schemas at the view level are known as subschema that describe dissimilar views of the database.
i need to submit in this topic.
Ask q“A database will be made to store information about patients in a hospital. On arrival, each patient’s personal details (name, address, and telephone number) are recorded wher
Partial Key : It is a group of attributes that can uniquely identify small entities and that are related to same base entity. It is sometime named as Discriminator. Altern
Q. Explain the terms key constraints participation constraints and mapping caradinalities in ER model. Participation Constraints : The participation of an entity set E i
What is known as heap file organization? In the heap file organization, any record can be placed anywhere in the file where there is space for the record. There is no ordering
Question: Data Mining is the process of extracting knowledge hidden from large volumes of raw data. (a) Using a suitable example, illustrate how Data Mining can be useful t
Describe log based recovery The most usably structure for recording data base modification is the LOG the log is a sequence of log records recording all the update activities i
Explain the Log Based Recovery Method? The system log that is generally written on stable storage consists of the redundant data required to recover from volatile storage failu
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd