Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
PHYSICAL DBMS ARCHITECTURE
The physical architecture defines the software components used to process and enter data, and how these software components are related and interconnected. Though it is not possible to simplify the component structure of a DBMS, it is possible to recognize a number of key functions which are similar to most database management systems. The components that normally execute these functions are shown in Figure , which depicts the physical architecture of a typical DBMS.
Figure: DBMS Structure
Based on many functions, the database system may be partitioned into the following modules. Some functions (for example, file systems) may be given by the operating system.
What are shortcomings in structured approach? Structured methodology treats data and their behaviours separately, and this makes it harder to isolate changes. If changes are re
What are the technique to define a schema completely ? A schema is completely define by DDL and DML query language.
Relational and E-R Model There are three types of constraints on relational database that have: DOMAIN CONSTRAINT PRIMARY KEY CONSTRAINT INTEGRITY CONSTRAINT
Explain retrieval in QBE? Retrieval in QBE : A "GUI" for expressing queries. Based on the Domain Relational Calculus (DRC) Actually invented before GUIs. Very co
Question 1 Discuss on transmission impairments Question 2 What is framing? Question 3 Write a note on 10Base2 10Base- T Question 4 Explain the rev
Explain Deadlock detection and recovery Deadlock Detection - A deadlock is said to take place when there is a circular chain of transaction, every waiting for the release of a
Explain controlled redundancy? Controlled redundancy : The replication of data within the data warehouse for the purposes of improved data access or understand ability.
ddlc
What does authentication refer? Authentication refers to the task of verifying the uniqueness of a person.
Question : (a) Differentiate between database integrity and database security (b) Database security involves measures to avoid loss of privacy and loss of confidentiality. D
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd