Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
PHYSICAL DBMS ARCHITECTURE
The physical architecture defines the software components used to process and enter data, and how these software components are related and interconnected. Though it is not possible to simplify the component structure of a DBMS, it is possible to recognize a number of key functions which are similar to most database management systems. The components that normally execute these functions are shown in Figure , which depicts the physical architecture of a typical DBMS.
Figure: DBMS Structure
Based on many functions, the database system may be partitioned into the following modules. Some functions (for example, file systems) may be given by the operating system.
1. Will you advise that your organization uses open source software and why? 2. Why is it important for business managers to have a basic understanding of the software development
In which relational modes, cardinality is termed? Answer : Cardinality is termed in a number of tuples relational modes.
Differentiate between a Global and a Local temporary table? - A local temporary table exists only for the duration of a connection or if defined inside a compound statement, fo
Question: (a) What is ODBC and what is its function? (b) What is Web application server, and how does it work from a database perspective? (c) What does e-commerce mean
Describe a technique for direct search? Explain how data is stored within a file so which direct searching can be performed. For a file of unordered fixed length records by u
Why are cursors necessary in embedded SQL? A cursor is an object used to store the output of a query for row-by-row processing through the application programs. SQL statements
Some disadvantages of File Oriented System ?
What are the states of transaction? The states of transaction are:- a) Active b) Partially committed c) Failed d) Aborted e )Committed f) Terminated
List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of
What is NULL? Give an example to described testing for NULL in SQL? The NULL SQL keyword is used to represent either a missing value or a value which is not applicable in a re
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd