What is a hashing function, Database Management System

Assignment Help:

What is a hashing function?  What are the properties of a good hashing function?  Describe the folding technique for hashing functions.    

 Ans:  Hashing function is a method to store a file on the disk. A hash function is a function which while applied to a value of a record (hash field) gives a hash value that is the address of the disk block where the record is stored.

   The properties of a good hash function are like this:

  • It must be easy to evaluate.
  • The hash value acquired should be within the range of valid addresses for a given file.
  • The hash values should be consistently distributed over the range of addresses so that the collisions are minimum.

Folding method for hashing functions:  It includes applying an arithmetic function like addition or a logical function such as exclusive OR to different parts of a hash field to compute the hash addresses. For instance, the numeric hash field can be split into start, middle and end regions, like that the sum of the lengths of the start and end regions equivalents the length of the middle region. The start, middle and end regions' digits are added to acquire a new value, x. After that x mod s, where s is the upper limit for the hash function, provides the hash value.


Related Discussions:- What is a hashing function

Database manager, Database Manager It is the interface among low-leve...

Database Manager It is the interface among low-level data, queries and application programs. Databases typically need a large amount of storage space. It is kept on disks, as

Create a table to record a passengers information, Given the following rela...

Given the following relations TRAIN (NAME, START, DEST) TICKET (PNRNO., START, DEST, FARE) PASSENGER (NAME, ADDRESS, PNRNO.) Write SQL expressions for the following queries: No

Unrepeatable reads-problems of concurrent transactions, Unrepeatable reads ...

Unrepeatable reads : Assume T7 reads X twice during its implementation. If it did not update X itself it could be very disturbing to see a dissimilar value of X in its next read. B

Types of locks, Types of Locks There are two necessary types of locks: ...

Types of Locks There are two necessary types of locks: Binary lock : This locking mechanism has two states for to a data item: locked or unlocked Multiple-mode loc

Implementing a data mining algorithm, i need to implememnt a treee based mi...

i need to implememnt a treee based mining algorithm. do you have an expert that can do that?

Describe integrity constraints, Describe integrity constraints? Integr...

Describe integrity constraints? Integrity Constraints - A database is just as excellent as the information stored in it, and a DBMS must therefore help avoid the entry of inc

Prove that a relation which is 4nf must be bcnf, Prove that a relation whic...

Prove that a relation which is 4NF must be BCNF.   Ans Let R be in 4NF.  Suppose it is not in BCNF.  Hence, there exists an FD X→Y in R such that x is not a super key. Although

What is the main advantage of the object model, What is the main advantage ...

What is the main advantage of the object model? What are its different components? The object model focuses on the logical data structures. Each object model comprises of many

Explain the functions and components of ddbms, Question 1 Explain the conc...

Question 1 Explain the concept of database recovery management. Explain the different levels of backup used for recovering data Question 2 What are the different types of par

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd