Two approaches to store relations in distributed database, Database Management System

Assignment Help:

What are the two approaches to store relations in distributed database?

a) Replication

b) Fragmentation

 


Related Discussions:- Two approaches to store relations in distributed database

Explain data independence, Explain data independence ? Data independenc...

Explain data independence ? Data independence is the capacity to modify the schema at one stage of a database system without having to change the schema at the further level.

Explain the structured decomposition, Differentiate between the object orie...

Differentiate between the object oriented decomposition and the structured decomposition? Process-oriented (structural) decomposition divides a complex process, function or tas

Column constraints-on delete cascade, CREATE TABLE prodtrans ( pno ...

CREATE TABLE prodtrans ( pno number (4) ptype char (1) CHECK (ptype in ('I','R','S')), qty number (5) FOREIGN KEY pno REFERENCES product (pno) ON DELETE CASCADE);

Draw enhanced er-diagram for hierarchy of a student database, Draw an EER d...

Draw an EER diagram that captures the "is-a" hierarchy of students in another simple database. The database captures both the "basic" information (say, student ID and student name)

Write short notes on relational model, Write short notes on relational mode...

Write short notes on relational model   The  relational  model  uses a  collection of  tables  to show  both data  and the relationships between those  data.  The relational mo

Oracle SQL Developer, Introductory course and so does not require any fancy...

Introductory course and so does not require any fancy coding. I will provide a guidance document to help you in producing the solutions.

Why are cursors necessary in embedded sql, Why are cursors necessary in emb...

Why are cursors necessary in embedded SQL? A cursor is an object used to store the output of a query for row-by-row processing through the application programs. SQL statements

Dealing with constraints violation, If the deletion violates referential in...

If the deletion violates referential integrity constraint, then three alternatives are available: Default option: - refuse the deletion. It is the job of the DBMS to describ

Primary key, The primary key is selected from the

The primary key is selected from the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd