Explain hashing techniques, Database Management System

Assignment Help:

Explain Hashing techniques

The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with one primary page and probably additional overflow pages per bucket. A file contains buckets 0 through N-1, with one primary page per bucket basically and additional overflow pages chained with bucket, if needed later. Buckets consist of data entries (or data records). A main drawback of the static hashing is that the hash address space is fixed. Therefore, it is hard to expand or shrink the file dynamically.


Related Discussions:- Explain hashing techniques

I need web security expert, I need web security expert , website management...

I need web security expert , website management Project Description: i want professional for the below . website management server management database management

2phase locking, we need example of 2phase locking

we need example of 2phase locking

Characteristics, what are the main characteristics of database

what are the main characteristics of database

Write a query to find name from the relational algebra, Consider the relati...

Consider the relations City (city_name, state) Hotel (name, address) City_hotel (hotel_name, city_name, owner) Answer the following queries in relational algebra (i) Find

Money making supermarket chain problem, Consider the ER schema below for th...

Consider the ER schema below for the MoneyMaking supermarket chain problem. Translate the given ER schema into SQL CREATE TABLE statement.

Which sorting technique is used to sort databases, Which sorting technique ...

Which sorting technique is used to sort databases, whose sizes are very big?  Give one such algorithm.  Why do sorting techniques like quicksort, insertion sort, etc.  not applied

Please answer me., gyan gurukul is a software company that provides softwar...

gyan gurukul is a software company that provides software related solution.

Need for multiple access paths, Need for Multiple Access Paths In pract...

Need for Multiple Access Paths In practice, most of the online information systems need the support of multi-key files. For example, consider a banking database application hav

List two restrictions that are applied on the modification, List two restri...

List two restrictions that are applied on the modification (updation, insertion or deletion) of base tables through view.  Ans: The two restrictions are: 1. If a view

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd