Relational database management, Database Management System

Assignment Help:

For this application, we will consider IBM DB2 catalog data (i.e., metadata) for IBM's enterprise-class servers running the z/OS (formerly OS/390 or MVS) operating system.  One of the outcomes of this question is to give you some experience in actually exploring the contents of what's in an RDBMS catalog.  This will also  give us a head start in thinking about query optimization-a major part of this course.

Go to this Web site: 

SYSIBM.SYSCOLUMNS

SYSIBM.SYSCOPY

SYSIBM.SYSDATABASE

SYSIBM.SYSDBRM

SYSIBM.SYSINDEXES

SYSIBM.SYSINDEXPART

SYSIBM.SYSPLAN

SYSIBM.SYSTABLEPART

SYSIBM.SYSTABLES

SYSIBM.SYSTABLESPACE

SYSIBM.SYSTABLESPACESTATS

In this course, we will frequently encounter a program that is a crucial component of an RDBMS.  That program is called an optimizer.  It tries to determine the optimal access path when accessing (e.g., retrieving) data in a database.  An optimizer obtains statistics or metadata (i.e., data about data) from a data repository in the DBMS called a catalog.  The catalog will have information about the columns of tables and indices; the number of rows in a table; the numbers, types, and (possibly) distribution of values for columns in  the tables; and literally hundreds of other pieces of information.


Related Discussions:- Relational database management

Explain hashing techniques, Explain Hashing techniques The hashing tech...

Explain Hashing techniques The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with

Assign, #quesDefine a job scheduling strategy that will meet business requi...

#quesDefine a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pi

Define the normalisation form, Define in which normalisation form if an att...

Define in which normalisation form if an attribute of a composite key is dependent on an attribute of other composite key. Ans: 3NF A relation is in 3 NF if an attribute of

Apriori algorithm-find all frequent large itemsets, Your friend owns a comp...

Your friend owns a computer store in Yuen Long, selling Desktop and Notebook PCs and other computer peripherals. Having been rather successful with his business there, he decided t

Transactions and concurrency management, Transactions And Concurrency Manag...

Transactions And Concurrency Management  Introduction One of the main benefits of storing data in an integrated repository or a database is to permit sharing of it betwee

What are the advantages of object oriented databases, What are the advantag...

What are the advantages of object oriented databases in comparison with others? Why it is still not widely used? Object oriented designs are coherent, efficient and less prone

ER Diagram, A database will be made to store information about patients in ...

A database will be made to store information about patients in a hospital. On arrival, each patient’s personal details (name, address, and telephone number) are recorded where poss

Windows 8 Administrative Tools, Which two tools are used to administer user...

Which two tools are used to administer users for Active Directory?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd