Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Which method is used to key transformation ?
A hash method is used to key transformation.
Attribute Preservation This is a easy and obvious necessity that includes preserving all the attributes that were there in the relation that is being decomposed.
what is union compatable?
How to reduce data redundency
Compare the Nested-loop join and block-nested loop join Ans: Nested loop join - It is costly as worst case cost, no. of block accesses needed is n r * b s + b r where b
What is serialization? Where it is used and why? Serialization is a basic term used for mechanisms which enable objects and object structures to be converted into portable for
Define shadow paging. An alternative to log-based crash recovery method is shadow paging. This technique requires fewer disk accesses than do the log-based methods.
About Attribute inheritance
Un-Normalized Form (UNF) If a table having non-atomic values at every row, it is said to be in UNF. An atomic value is something that cannot be further decomposed. A non-atomic
Describe the four main ways of optimising disk block access. Ans: a. Disk b. Non-volatile writes buffers c. File organization (Clustering) d. Log-based file system
What is Functional Dependency? A Functional dependency is shown by X Y among two sets of attributes X and Y that are subsets of R specifies a constraint on the possible tuple
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd