Found 1659 Articles for Big Data Analytics

Differentiate between OS and DBMS files and OS and DBMS buffer manager

Bhanu Priya
Updated on 08-Jul-2021 07:38:25

557 Views

A Database Management System (DBMS) is a mix of computer software, hardware, and data intended to electronically control information by means of computer preparation.Two sorts of database management systems are DBMS and FMS.In straightforward terms, a File Management System (FMS) is a Database Management System that enables access to single records or tables at once.FMS oblige level records that have no connection to different documents.The FMS was the ancestor for the Database Management System (DBMS), which enables access to various records or tables at once.We have to utilize circle stockpiling for the database, and to exchange pieces of information between ... Read More

What is the role of file organization modules for typical file system software(DBMS)?

Bhanu Priya
Updated on 08-Jul-2021 07:37:00

265 Views

File organization is the way of storing data in the file. It is very useful as it determines ways of accessing it, storing it while maintaining the flexibility of the system.Role of file organizationHence, the roles of file organization are as follows −It provides flexibility.Easy access of data in files.Easy storage.Decrease the complexity of the overall system and files are stored and well maintained.Provide security to data.Saves users time in searching for particular information / data in file as every data is arranged so nicely.MethodsThe methods of file organization are as follows −ContiguousData and files are arranged in contiguous address ... Read More

What are hashed files and indexed file organization(DBMS)?

Bhanu Priya
Updated on 08-Jul-2021 07:34:24

6K+ Views

Let us begin by understanding the hashed file organisation.Hashed File OrganisationHashed file organisation is also called a direct file organisation.In this method, for storing the records a hash function is calculated, which provides the address of the block to store the record. Any type of mathematical function can be used as a hash function. It can be simple or complex.Hash function is applied to columns or attributes to get the block address. The records are stored randomly. So, it is also known as Direct or Random file organization.If the generated hash function is on the column which is considered as ... Read More

Explain the concept of indexing in DBMS

Bhanu Priya
Updated on 08-Jul-2021 07:30:32

3K+ Views

Indexing is one of the techniques used to optimize performance of a database by reducing the number of disk accesses that are required when a query is processed.A database index is a data structure that is helpful to quickly locate and access the data in a database table.Indexes are created using database columns.The first column is the Search key which contains a copy of the primary key or candidate key of the table.The second column is the data reference that contains a set of pointers which hold the address of the disk block where the key value can be found.Structure ... Read More

What is the common source of database failure?

Bhanu Priya
Updated on 08-Jul-2021 07:29:07

2K+ Views

Database failure is a quite common problem of information technology. It can occur even with good database system software. There may be a simple error which can lead to loss of the complete database.Causes of database failureSome of the causes for database failure are as follows −Database file corruptionIf a file in the database is corrupted or damaged, it can lead to the database failure. The file can become corrupt due to the following reasons −Changes in the SQL Server account.Accidental data deletion.File header corruption.Errors in accessing the data.InterruptionWhen the server or computer is not shut down properly or during ... Read More

What are different types of recoverability of schedules(DBMS)?

Bhanu Priya
Updated on 22-Dec-2022 10:33:01

22K+ Views

If any transaction that performs a dirty read operation from an uncommitted transaction and also its committed operation becomes delayed till the uncommitted transaction is either committed or rollback such type of schedules is called as Recoverable Schedules.Types of recoverable schedulesThere are three types of recoverable schedules which are explained below with relevant examples −Cascading schedulesCascadeless SchedulesStrict Schedules.The types of recoverable schedules are given below in form of a chart −Recoverable scheduleFirst, let us see an example of a recoverable schedule.T1T2R(X)W(X)W(X)R(X)commitCommitHere, transaction T2 is reading value written by transaction T1 and the commit of T2 occurs after the commit of ... Read More

What is OLAP? Explain its advantages and disadvantages

Bhanu Priya
Updated on 08-Jul-2021 07:17:43

5K+ Views

OLAP represents online insightful handling and can be characterized as: "Online logical preparation alludes to an assortment of exercises typically performed by End-clients in the online framework."OLAP incorporates choice help, demonstrating, data recovery, impromptu detailing, and imagining a scenario in which investigation. OLAP focuses on choice help needs.ERP framework is a choice help instrument that gives constant data to the board and permits the executives to make convenient choices based on that data that is expected to improve execution and to accomplish determined objectives.Example of OLAPThe case of OLAP can be consolidating deals information by deals channel, item type, and ... Read More

What are the Database recovery techniques?

Bhanu Priya
Updated on 08-Jul-2021 07:13:51

13K+ Views

Database systems which are similar to some different PC frameworks, are mainly dependent upon disappointments however the information put away in it should be accessible as and when required. At that point, when an information base bombs it should have the offices for quick recuperation. It should likewise have atomicity, For example, either exchanges are finished effectively and submitted (the impact is recorded for all time in the information base) or the exchange ought to have no impact on the data set.There are both programmed and non-programmed ways for both, backing up information and recuperation from any disappointing circumstances. The ... Read More

What are different transaction isolation levels in DBMS?

Bhanu Priya
Updated on 08-Jul-2021 07:11:43

6K+ Views

In case of transaction the term ACID has been used significantly to state some of important properties that a transaction must follow. We all know ACID stands for Atomicity, Consistency, Isolation and Durability and these properties collectively called as ACID Properties.Properties of transactionDatabase system ensures ACID property −Atomicity − Either all or none of the transaction operation is done.Consistency − A transaction transfer from one consistent (correct) state to another consistent state.Isolation − A transaction is isolated from other transactions. i.e. A transaction is not affected by another transaction. Although multiple transactions execute concurrently it must appear as if the ... Read More

Explain the precedence graph for testing conflict serializability(DBMS)

Bhanu Priya
Updated on 08-Jul-2021 07:09:34

2K+ Views

Conflict serializability orders any conflicting operations in the same way as some serial execution. A pair of operations is said to conflict if they operate on the same data item and one of them is a write operation.That means, Readi(x) readj(x) - non conflict read-read operationReadi(x) writej(x) - conflict read-write operation.Writei(x) readj(x) - conflict write-read operation.Writei(x) writej(x) - conflict write-write operation.Where, I and j denote two different transactions Ti and Tj.Precedence graphNow consider a precedence graph for testing conflict serializability. It is used to check conflict serializability.Steps for precedence graphFor each transaction T, put a node or vertex in the ... Read More

Previous 1 ... 4 5 6 7 8 ... 166 Next
Advertisements