Explain how the object classes are mapped to tables, Database Management System

Assignment Help:

Explain how the object classes are mapped to tables.

Each object class maps to one or more than one tables in the database. The objects in the class may be partitioned horizontally or/and vertically. For instance, if class has many instances of which, a few are often referenced. In this case, horizontal partitioning may improve efficiency by placing the frequently accessed objects in a table, and the remaining objects in another tables. Similarly, if a class has attributes with different access patterns, it may help to partition the objects vertically.

 


Related Discussions:- Explain how the object classes are mapped to tables

Why dml is used for, Why DML is used for? DML is used to Manipulation and...

Why DML is used for? DML is used to Manipulation and processing of database. DML is provided for manipulation & processing of database. (Data stored in the database is processed

Which two files are used during operation of the dbms, Which two files are ...

Which two files are used during operation of the DBMS? Data dictionary and transaction log are two files used during operation of the DBMS.

Chapter 1 - Profile for the Organization, Chapter 1 - Profile for the Organ...

Chapter 1 - Profile for the Organization You have to select an organization of your choice and assume that you work for that organization. Now you must prepare a brief profile of t

Idea for fyp, want a idea for final year project

want a idea for final year project

Main difference between read-only and update methods, What is the main diff...

What is the main difference between read-only and update methods? A read-only method does not affect the values of a variable in an object, whereas an update method may alter t

Describe the most important classes of parallel machines, Question 1 Discu...

Question 1 Discuss the classification of DBMS based on location of database Question 2 Explain with examples different SQL commands used for creating and deleting relations.

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

What are the different approaches for database design, What are the differe...

What are the different approaches for database design? There are two basic approaches for database design which are as follows: Attribute driven: It compiles a list of att

Define- relational algebra, Define- relational algebra. The relational ...

Define- relational algebra. The relational algebra is a procedural query language. It having of a set of operations that take one or two relation as input and make a new relati

Relation schema for student, Example RELATION SCHEMA for STUDENT: STU...

Example RELATION SCHEMA for STUDENT: STUDENT (Roll No: string, name: string, login: string, age: integer) RELATION INSTANCE

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd