Explain th process to avoid re-computation, Database Management System

Assignment Help:

Saving Derived Attributes to Avoid Re-computation

Data that is derived from other data should be stored in the computed form to avoid re-computation. For this, we could define new classes and objects and these derived classes must be updated if any of the base objects is changed.

 


Related Discussions:- Explain th process to avoid re-computation

List the sql domain types, List the SQL domain Types? SQL supports the ...

List the SQL domain Types? SQL supports the following domain types. 1) Char(n) 2) varchar(n) 3) int 4) numeric(p,d) 5) float(n) 6) date.

Functional Dependencies, What exactly is the concept of Functional Dependen...

What exactly is the concept of Functional Dependencies? And how do we associate this concept with the logic of Super-keys, Candidate Keys, etc? Given Relation R(A,B,C,D,E) with de

Define data independence, Data independence seems that "the application is...

Data independence seems that "the application is independent of the access strategy and storage structure of data". In other words, the ability to change the schema definition in o

What is assertion, What is assertion? Mention the forms available. An a...

What is assertion? Mention the forms available. An assertion is a predicate expressing a condition that we wish the database always to satisfy. Domain integrity constraints.

The locking protocol, The Locking Protocol: To manage concurrency related ...

The Locking Protocol: To manage concurrency related problems we use locking. A lock is mainly a variable that is associated with a data item in the database. A lock can be located

Explain the functions of data manager, Explain the functions of data manage...

Explain the functions of data manager? Functions of Data Manager : - Convert operations in user's queries coming directly through query processor or indirectly in an applicatio

Explain recovery process after system failure, Explain recovery process aft...

Explain recovery process after system failure using checkpoint. Ans: Checkpoint scheme or method is an extra component of the log based recovery system. This scheme is used to

B+ tree, construct a B+ tree for the following set of key value (2,3,5,7,11...

construct a B+ tree for the following set of key value (2,3,5,7,11,19,23,29,31) in ascending order where the pointers that will fit in one node is as follows:A. four B. six C. eigh

Describe the static hash file with buckets and chaining, Describe the stati...

Describe the static hash file with buckets and chaining and show how insertion, deletion and modification of a record can be performed. In static hash file organization, the wo

DBMS, what is specialization?

what is specialization?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd