- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1725 Articles for Big Data Analytics

Updated on 08-Jul-2021 08:23:17
RDBMS is a relational database management system which is the root for SQL. It is designed totally for relational models. The relational model can be represented on a table with rows and columns. Oracle is an example of RDBMS.RDBMS is a plan of action and employs a structure which permits to recognize, update and handle the relation database.It is arranged in tables which contains rows and columns.Every row in a table is nothing but a record through the unique ID known as key. Employs the normalization (method of arranging data in a database for eliminating the redundancy).Functions of RDBMSRDBMS provides ... Read More 
Updated on 08-Jul-2021 08:21:34
Database management system (DBMS) is a software or tool which can be used for managing and maintaining the data within the database.Major Capabilities of DBMSThe major capabilities of DBMS are listed below −Data StorageData RetrievalData UpdateSecurityData IndependenceExplanationGenerally a person has to work with a huge amount of information every day. In order to interact with the large amount of data we need a system where we can store, manipulate, security, sharing the information all over the world. It is a core reason the industries are maintaining database management tools.Powerful Relational DBMSThe relational DBMS is more powerful because of the reasons ... Read More 
Updated on 08-Jul-2021 08:19:43
The database security is broadly classified into physical and logical security. Database recovery is the way of restoring a database to a correct state in the event of a failure.Physical security − Physical security refers to the security of the hardware that is associated with the system and the protection of the site where the computer resides. The natural events like fire, floods, and earthquakes can be considered as some of the physical threats. It is advisable to have backup copies of databases in the face of massive disasters.Logical security − Logical security refers to the security measures present in ... Read More 
Updated on 08-Jul-2021 08:18:15
In a hierarchical database, the information is composed in a tree-like structure. The individual information is put away in a field and the fields, thus, structure records. This information is obtained with the assistance of connections between them.In this structure, every one of the information records is connected at long last to a solitary parent record.It is additionally called as the owner of record. The connections between the records are regularly shown as parent-child relations.The best utilization of hierarchical databases is its sending in a library framework as it stores names or book numbers utilizing the Decimal System.This framework takes ... Read More 
Updated on 08-Jul-2021 08:16:16
Query Processing is a translation of high-level queries into low-level expression. It is a step wise process that can be used at the physical level of the file system, query optimization and actual execution of the query to get the result.It requires the basic concepts of relational algebra and file structure. It refers to the range of activities that are involved in extracting data from the database. It includes translation of queries in high-level database languages into expressions that can be implemented at the physical level of the file system.Given below is the diagram that shows the steps of the ... Read More 
Updated on 08-Jul-2021 08:14:09
First, we need to know about database privacy and later we will go for the issues regarding database privacy and the security measures regarding the issues.Database Privacy − It is nothing but the securing of data which is present in the database. Generally, we used to store a large amount of data in the database. For that important data to be secured we need to use some security measures like security firewalls, Antivirus, security encryption, etc.Encryption − It means that the data or information is to be encoded. It means that the format of the data is not at all ... Read More 
Updated on 08-Jul-2021 08:12:09
In parallel database system data processing performance is improved by using multiple resources in parallel. In this CPU, the disk is used parallel to enhance the processing performance.Operations like data loading and query processing are performed parallel. The centralized and client server database systems are not powerful enough to handle applications which need fast processing.Parallel database systems have great advantages for online transaction processing and decision support applications. Parallel processing divides a large task into multiple tasks and each task is performed concurrently on several nodes. This gives a larger task to complete more quickly.Architectural ModelsThere are several architectural models ... Read More 
Updated on 08-Jul-2021 08:10:18
Logical Database Design has a low-level description of entities that are defined and how they are related to each other and what kind of data is to be stored. This model determines if all the requirements of the business have been gathered.Physical Database Design deals with how the data will be stored in the database using suitable DBMS and this design is generally created by database administrators and developers.DifferencesThe major differences between logical database design and physical database design are as follows −Logical Database DesignPhysical Database DesignThat describes the data without regard to how they will be physically implemented in ... Read More 
Updated on 08-Jul-2021 08:08:15
Physical database designing is used for good performance while the process of structuring data in the storage.Factors influencing physical database designLet us see the important factors that influence physical database design −Transactions and queriesIt is important to understand what kind of transactions and queries will be run and what use will the database serve.Following information about the queries should be needed −Files that will query access.Selection conditions to be specified for the query.Type of selection conditions to be used in query whether equality, range, or inequality.Join conditions to be used in the query.Need for linking tables for query optimization.Following information ... Read More 
Updated on 08-Jul-2021 08:03:39
For any stored data if we want to preserve the consistency and correctness, a relational DBMS typically imposes one or more data integrity constraints. These constraints restrict the data values which can be inserted into the database or created by a database update.Data Integrity ConstraintsThere are different types of data integrity constraints that are commonly found in relational databases, including the following −Required data − Some columns in a database contain a valid data value in each row; they are not allowed to contain NULL values. In the sample database, every order has an associated customer who placed the order. ... Read More Advertisements