Static Hashing In static hashing, the resultant data bucket address will always be the same. That means if we generate an address…
three schema architecture
-
-
Denormalization in Databases When we normalize tables, we break them into multiple smaller tables. So when we want to retrieve data from…
-
Database Language A DBMS has appropriate languages and interfaces to express database queries and updates. Database languages can be used to read,…
-
RAID RAID refers to redundancy array of the independent disk. It is a technology which is used to connect multiple secondary storage…
-
SQL Commands SQL commands are instructions. It is used to communicate with the database. It is also used to perform specific tasks,…
-
Testing of Serializability Serialization Graph is used to test the Serializability of a schedule. Assume a schedule S. For S, we construct…
-
Double-Pipelined Join Algorithm In our previous section, we understood about pipelining and the ways through which a system creates and implement pipeline…
-
Lock-Based Protocol In this type of protocol, any transaction cannot read or write data until it acquires an appropriate lock on it.…
-
Recoverability of Schedule Sometimes a transaction may not execute completely due to a software issue, system crash or hardware failure. In that…
-
SQL Datatype SQL Datatype is used to define the values that a column can contain. Every column is required to have a…