Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles on Trending Technologies
Technical articles with clear explanations and examples
Object Database Conceptual Design
You should consider the needs of the applications during designing a database. Object databases offer a unique approach to database design that can be beneficial in certain situations. In this article, we will discuss the conceptual design of object databases. Object database design Object-Oriented Model is process of representing real-world entities as objects in computer programs. It is fundamental aspect of Object Database Conceptual Design. Object-oriented modeling is more flexible and dynamic than traditional relational model. It enables developers to model complex relationships between objects more efficiently. Object-oriented modeling allows for inheritance, encapsulation, and polymorphism. It is easier to maintain ...
Read MoreObject Identity, and Objects versus Literals
DBMS supports object-oriented data. It ensures direct correspondence between real-world objects and their representations in the database. This correspondence ensures that objects retain their integrity and identity. It enables easy identification and manipulation. Object Data Management System (ODMS) assigns unique identity to each independent object stored in the database. This unique identity is implemented through a system-generated object identifier (OID). This OID serves as distinct value assigned to each object by the system. It is not visible to external users. However it is internally utilized by the system to ensure the unique identification of each object and to establish and ...
Read MoreObject-Relational Features_ Object Database Extensions to SQL
In DBMS, there are object-relational features that combine elements of object databases with SQL. SQL language is used for relational databases, and it has evolved over time. In the latest standard called SQL:2008, object features have been incorporated, although not all commercial DBMSs have implemented these features yet. Object-relational model refers to the combination of the relational model and object database enhancements. SQL has undergone revisions to include features related to XML as well. Here are some of the object database features included in SQL: Type Constructors New type constructors have been added to specify complex objects. For example, the ...
Read MoreOffset-Fetch in MS SQL Server
Offset-Fetch is feature in MS SQL Server. It helps to retrieve subset of rows from result set. It consists of two components: OFFSET and FETCH. The OFFSET clause specifies the number of rows to skip from the beginning of the result set. FETCH clause determines the number of rows to retrieve. Syntax SELECT column1, column2, ... FROM table ORDER BY column OFFSET {integer_value} {ROWS | ROWS ONLY} FETCH {FIRST | NEXT} {integer_value} {ROWS | ROWS ONLY} ONLY; Explanation of Syntax SELECT column1, column2, ...: Specifies the columns to be selected from the table. FROM table Specifies the table from ...
Read MoreOLAP Guidelines (Codd_s Rule)
OLAP (Online Analytical Processing) is data processing technique. It is used to query and analyze data. It analyze data in real time from multiple sources. In 1993, EF Codd introduced 12 rules for the relational database model for OLAP systems. These rules are known as "Codd’s rules". These rules serve as a guideline for the design and development of OLAP systems. In this article, we will explore these 12 rules developed by Codd. Codd’s rules These are 12 rules for OLAP systems, as proposed by E.F. Codd − Multidimensional Conceptual View OLAP system should provide multidimensional conceptual view of ...
Read MoreOn Line Transaction Processing (OLTP) System in DBMS
On-Line Transaction Processing (OLTP) System is a type of computer system that helps manage transaction-related tasks. These systems are made to quickly handle transactions and queries on the internet. For instance, supermarket's POS (point of sale) system is an example of an OLTP system. Almost every industry nowadays uses OLTP systems to keep track of their transactional data. OLTP systems mainly focus on entering, storing, and retrieving data, which includes daily operations like purchasing, manufacturing, payroll, accounting, etc. Many users use these systems for short transactions. They support simple database queries, which makes it easier for users to get ...
Read MoreOperations on Files
Retrieval and Update Operations When we work with files, we usually do two types of operations: retrieval and update. Retrieval operations help us find specific records in the file and look at their data. Update operations change the file by adding, removing, or modifying records. Selection Conditions To do either operation, we may need to specify a condition that the records must meet. For example, we might want to retrieve all the records where the salary is greater than or equal to $30, 000. This is called a selection condition. Selection conditions can be simple or complex. A simple condition ...
Read MoreOperations on table in Cassandra
Cassandra is a distributed NoSQL database system. It offers high scalability, availability, and fault-tolerance. It uses a decentralized architecture, where data is distributed across multiple nodes, and provides several operations to manipulate data. In this article, we will discuss operations on tables in Cassandra. Creating Tables The first operation in Cassandra is to create a table. A table is defined by set of columns. Each column has name, data type, and an optional value. To create a table, you need to specify the keyspace. It is namespace that defines the replication strategy, and the table name. You also need to ...
Read MoreOracle Label-Based Security
Oracle Label-Based Security (OLS) is a feature of the Oracle Database that provides fine-grained access control over sensitive data based on security labels. This feature enables organizations to enforce access control policies based on the sensitivity of the data rather than the traditional approach of user roles and privileges. In this article, we will discuss how Oracle Label-Based Security works and its benefits. Oracle Label-Based Security Oracle Label-Based Security works by assigning a security label to each row of data in a table. The label identifies the sensitivity level of the data, such as confidential, secret, or top secret. Each ...
Read MoreOther Primary File Organizations
Files of Mixed Records In DBMS, file organizations are designed to handle records of a single type. However, in most real-world applications, multiple types of entities are interconnected in various ways. To represent relationships among records in different files, fields are connected. For example, a STUDENT record may have a connecting field Major_dept, whose value gives the name of the DEPARTMENT in which the student is majoring. The Major_dept field refers to a DEPARTMENT entity, which should be represented by a record of its own in the DEPARTMENT file. Retrieving field values from two related records requires retrieving one of ...
Read More