Security-data fragmentation, Database Management System

Assignment Help:

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist.

But how can we carry out fragmentation? Fragmentation may be carried out as per the following rules:

a)      Completeness: This rule makes sure that there is no loss of data while fragmentation. If a relation is decomposed into fragments, then every data item must appear in at least single fragment.

b)      Reconstruction: This rule makes sure preservation of functional dependencies. It should be possible to describe a relational operation that will reconstruct the relation from its fragments.

c)       Disjointness: A data item that shows in a fragment should not show in any other fragment. Though, a typical fragmentation known as vertical fragmentation is an exception to this rule. In vertical fragmentation the primary key attributes must be repeated to permit reconstruction of original relation.

This rule makes sure minimization of data redundancy. What are the dissimilar types of fragmentation?

 


Related Discussions:- Security-data fragmentation

ER model, coventions for displaying an ER schema as ER diagram

coventions for displaying an ER schema as ER diagram

Natural join-table handling, Natural Join : It is the similar like Equi joi...

Natural Join : It is the similar like Equi join except one of the duplicate columns is removed in the result table. The natural join is the most usually used form of join operation

E-commerce and business intelligence systems., Your friend owns and operate...

Your friend owns and operates a wholesale shoe business with annual revenues of $5 million dollars. His wholesale business specializes in supplying and supporting retailers with sh

How to create a table from existing table, How to create a table from exist...

How to create a table from existing table? Create table as e.g, To create a new table ‘N_emp' with employee names and their identification numbers only from employee ta

Relationship cardinality, Cardinality shows the number of instances of an e...

Cardinality shows the number of instances of an entity associated with another entity participating in a relationship. Depend on the cardinality binary relationship can be further

Original Database, I need an ERD created for any original database(can be o...

I need an ERD created for any original database(can be on anything). It needs to be 3NF. I then need all the CREATE STATEMENTS, INSERT STATEMENTS(anything you can think of as long

What is a view in sql and when can views be updated, What is a view in SQL?...

What is a view in SQL? When can views be updated? A view is a virtual table which consists of columns from one or more tables. Through it is same to a table; it is stored in

What are the uses of odbc, What are the uses of ODBC? Under what circumstan...

What are the uses of ODBC? Under what circumstances we use this technology? ODBC expose database capabilities within a standardized way to the application programmer by an ap

Distinguish among a datareader class and a dataset class, Question (a) ...

Question (a) Concurrent access to data from a database is a normal part of application program usage. Describe three approaches to concurrency control (b) Distinguish among

Relational algebra, Relational Algebra is a set of basic operations used to...

Relational Algebra is a set of basic operations used to influence the data in relational model. These operations allow the user to specify basic retrieval request. The result of re

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd