Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
define two-phase locking protocolans two-phase locking is significance in the context of ensuring that schedules are serializable the two-phase
describe the different raid levels discuss the choices of the different raid levels for different
describe the various types of online analytical processing olap tools and briefly discuss how the support common analytical
using a labelled diagram explain the operation of the data warehouse define the basic architectural components and outline the main functionalities
explain the exec statement in sql ans all statements which start with exec sql are embedded sql database statements high level languages such as c
what is triggertrigger a database trigger is procedural code which is automatically executed in response to specific events on a particular table in
define null valuenull value null means something is unknown it does not mean null the digit 0 null is as well employed as attribute value for a
explain the isa relationshipanswer isa relationship - isa notation is employed in generalization specialization to depict relationship among lower
define functional and multivalued dependencies ans a functional dependency is a assets of the semantics of the attributes
describe five main functions of a database administratorans a database administrator dba is a person who is accountable for the environmental aspects
explain domain calculusdomain calculus is one of the types of the relational calculus the formal specification of the domain calculus was planned
explain the ansi sparc architecturethe three-schema architecture is as well known as ansi sparc architecture the aim of the three-schema architecture
explain two phase locking protocola transaction is consider as to follow the two-phase locking protocol if all locking operations precede the first
explain the dynamic hashing techniques there are two methods in it extendible hashing - stores an access structure in addition to the file and
explain hashing techniquesthe hashing techniques can be categorized as static hashing techniques - in this method the data can be viewed a collection
define the query optimisationthe query parser commonly generates a standard initial tree to correspond to an sql query with no doing any optimization
define deadlock recovery measures to recover from deadlock the cycle in the
what is the need of a log in a dbms briefly describe the various types of records that are normally present in a log
what are wait-for-graphsgive the algorithm to construct a wait-for-graph from a given schedule of transactions how can deadlocks be detected from
which sorting technique is used to sort databases whose sizes are very big give one such algorithm why do sorting techniques like quicksort
what are the two integrity rules ans the two integrity rules are entity integrity rule amp referential integrity rule entity integrity
what is the meaning of recovery in deferred update methods if a transaction fails before arriving its commit point it will not have altered the
define the immediate update the immediate update methods may apply changes to the database on disk before the transaction arrives a successful
explain the deferred update the deferred update methods do not physically update the database on disk till after a transaction reaches its commit
list the armstrongs axioms for functional dependencies what do you understand by soundness and completeness of these