Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is database Trigger?
A database trigger is a PL/SQL block that can explained to automatically execute for insert, update, and delete statements against a table. The trigger can e defined to execute once for the entire statement or once for each row that is inserted, updated, or deleted. For any one table, there are twelve events for which you can explain database triggers. A database trigger can call database procedures that are also written in PL/SQL.
Mappings between Levels and Data Independence The 3 levels of abstraction in the database do not exist separately of each other. There must be some correspondence, or mapping
Define shadow paging. An alternative to log-based crash recovery method is shadow paging. This technique requires fewer disk accesses than do the log-based methods.
Discuss deferred update technique of recovery. What are the advantages? Ans: The deferred update methods do not physically update the database on disk till after a transact
What is Disadvantages Of DBMS ? 1. Cost of Software and Hardware and Migration - A important disadvantage of the DBMS system is cost. 2. Reduced Response and Throughpu
explaination
The Transactions- A transaction is definite as the unit of work in a database system. Database systems that deal with a huge number of transactions are also termed as transaction p
Define and differentiate between ordered indexing and hashing. Ans: Ordered indexing: To gain fast random access to records in a file, we can make of an index structure. Every
Depending upon the rules we have found, we can classify the locks into two types. Shared Lock: A transaction might be acquiring shared lock on a data item in order to read it
Explain cursors in SQL? Cursors in SQL - An object used to store the output of a query for row-through-row processing through the application programs. Cursors are constructs
Which method is used to key transformation ? A hash method is used to key transformation.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd