Security-data fragmentation, Database Management System

Assignment Help:

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist.

But how can we carry out fragmentation? Fragmentation may be carried out as per the following rules:

a)      Completeness: This rule makes sure that there is no loss of data while fragmentation. If a relation is decomposed into fragments, then every data item must appear in at least single fragment.

b)      Reconstruction: This rule makes sure preservation of functional dependencies. It should be possible to describe a relational operation that will reconstruct the relation from its fragments.

c)       Disjointness: A data item that shows in a fragment should not show in any other fragment. Though, a typical fragmentation known as vertical fragmentation is an exception to this rule. In vertical fragmentation the primary key attributes must be repeated to permit reconstruction of original relation.

This rule makes sure minimization of data redundancy. What are the dissimilar types of fragmentation?

 


Related Discussions:- Security-data fragmentation

List the set operations of sql, List the set operations of SQL? 1) Unio...

List the set operations of SQL? 1) Union 2) Intersect operation 3) The except operation

How can you map null values to other values while display, How can you map ...

How can you map NULL values to other values while display? IF( ) , IFNULL( ) keywords are used to do so. They are 'LIMIT' is used for the following kinds of problems: 1) Ans

Command line interfaces, Command Line Interfaces: These are interactive int...

Command Line Interfaces: These are interactive interfaces, character-based that let you use the complete power and functionality of the DBMS query language directly. They permit yo

What is bucket overflow and how bucket overflow is handled, What is bucket ...

What is bucket overflow and how bucket overflow is handled through Over Flow Chaining or Closed Hashing? Ans: Bucket: unit of storage holding records. Bucket is a disk block

Example of primary key, Suppose that in an organisation, an employee may do...

Suppose that in an organisation, an employee may do different roles in dissimilar projects. Say, RAM is doing coding in one project and doing designing in another. Suppose that the

What are the authentication modes in sql server, What are the authenticatio...

What are the authentication modes in SQL Server? How can it be changed? Windows mode and Mixed Mode - SQL and Windows. To alter authentication mode in SQL Server click Start, P

In how many parts events are classified, In how many parts events are class...

In how many parts events are classified Events are classified as four types in UML 1.  Signals 2.  Calls 3.  Passing of Time 4.  Change in State

Create a database model, Submit the table creation statements (including co...

Submit the table creation statements (including constraints) for the Database Model. Submit them all in a single script file. Also submit a document explaining what test data yo

School portal design and development, Project Description: This is going...

Project Description: This is going to be a School portal to handle each activities in school such as, School fees payment, online registration and every other payment, course re

Nested query, what is correlation in nested query

what is correlation in nested query

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd