Found 6705 Articles for Database

Data Marts(storage component of HDFS)

Amrendra Patel
Updated on 22-Aug-2023 16:46:30

370 Views

Data mart is a storage component and only cares about some specific functional area of an organisation which are then taken care by a single department like marketing, sales, finance etc. Data Mart and Data Warehouse are both storage components of HDFS. Data Mart contains a subset of the data stored in the data warehouse. Frequently requested data can easily be accessed through data mart. Simple to Implement and cost is lower as compared to data warehouse. It is more open to change and its smaller size makes it quicker to build if any change in model occurs. ... Read More

Data Architecture Design & Data Management

Amrendra Patel
Updated on 11-Oct-2024 11:18:34

3K+ Views

Data architecture design consists of standards that have certain rules, policies, and data types to be collected, from where the data is collected, storage of data, arrangement of data, and then using that data for further analysis. Data plays a vital role in the successful execution of business strategy. Data architecture design It helps us to show how users view the data in the database. It describes the type of data structures used to manage data and make the processing easy. the concept of dbms depends on its architecture. It is divided into three models i.e. conceptual model, ... Read More

Data anomalies in DBMS

Amrendra Patel
Updated on 22-Aug-2023 16:37:05

16K+ Views

Anomalies means problems or inconsistency which happened during the operations performed on the table. There can be many reasons that anomaly occur for example, It occurs when data is stored multiple times unnecessarily in the database i.e. redundant data is present or it occur when all the data is stored in a single table. normalization is used to overcome the anomalies. the different type of anomalies are insertion, deletion and updation anomaly. Input The same input is used for all three anomalies. Student ID Name Age Branch Branch_Code Hod_name 1 A 17 Civil 101 Aman ... Read More

Current user function in SQL

Amrendra Patel
Updated on 22-Aug-2023 16:27:22

547 Views

It is used to return the name of the current user in sql database server. it does not accept any parameter. Syntax CURRENT_USER Current_user is the function used to get the name of current user Example 1 In this example, we are going to use the current_user function to get the current user name. Input Employee Emp_id Name Dept_name Salary 1 Monu IT 50000 2 Sonu HR 60000 3 Golu Security 70000 This database is currently used by amrendra. Code SELECT CURRENT_USER;#selected current user name Output Amrendra ... Read More

Creating materialised view using table definition in cassandra

Amrendra Patel
Updated on 22-Aug-2023 16:19:18

124 Views

A materialised is defined as a database object that contains the results of a particular query. It could be called as a subset of a table. Any changes in the base table would be reflected in the materialised view. Syntax CREATE MATERIALISED VIEW view_name AS SELECT * FROM table_name WHERE column_name IS NOT NULL PRIMARY KEY (provide_primary_key) Here, view_name is the name of the materialised view, table_name is the base table, column_name are the columns provide_primary_key are the primary keys for the base table. Example 1 In this example, we are gonna have a ... Read More

Create, Alter & Drop schema

Amrendra Patel
Updated on 22-Aug-2023 16:13:08

195 Views

Create a schema Schema is basically the logical representation of the database. there is a default schema named dbo. Objects gets created inside a schema when ‘create schema’ statement is used. To provide access to other user after the schema is created, we need to impersoinate permissions. Syntax:The syntax to create a schema is − Create schema schema_name Here, we have created a schema named schema_name. Example 1: Granting permissions In this example, we are going to create a schema and grant permissions to have access to that. Algorithm Step 1 − Create a schema. Step 2 − ... Read More

Create login in SQL Server

Amrendra Patel
Updated on 22-Aug-2023 15:09:44

364 Views

A login is a security check process to authenticate the user and make their data secure. In case of SQL, we need to login to connect to the server. Creating login for the server gives a security advantage. Also, security implications are to be understood and kept in mind while creating a login. A user will be granted the access of the database after user login is provided. Here, we are going to use various methods. Method 1: login with Password We are going to use simply the userid and password to login to the server. Syntax Create login ... Read More

Difference between Amazon S3 and Amazon EBS

Md. Sajid
Updated on 16-Aug-2023 13:19:12

3K+ Views

Amazon Web Services (AWS) provides a wide range of cloud storage services to satisfy a variety of needs. Amazon S3 (Simple Storage Service) and Amazon EBS (Elastic Block Store) are two prominent storage alternatives provided by AWS. Read this article to find out more about Amazon S3 and Amazon EBS and how they are different from each other. What is Amazon S3? Amazon S3 (Simple Storage Service) is a highly scalable and long-lasting object storage service offered by Amazon Web Services (AWS). It is designed to store and retrieve any amount of data from anywhere on the internet. S3 ... Read More

Difference between AFIS and Biometric Fingerprint Systems

Md. Sajid
Updated on 16-Aug-2023 13:15:05

573 Views

AFIS (Automated Fingerprint Identification System) and biometric fingerprint systems are used for fingerprint recognition and identification; however, they differ significantly in scope and functionality. Read this article to find out more about AFIS and Biometric fingerprint systems and how they are different from each other. What is AFIS? AFIS stands for Automated Fingerprint Identification System. It is a computer-based biometric technology that automates fingerprint identification and comparison. The fundamental goal of AFIS is to store, search, retrieve, and analyses massive amounts of fingerprint data for identification and investigation reasons. Law enforcement and forensic departments use AFIS to help solve ... Read More

How To Optimize MySQL Tables?

Mrudgandha Kulkarni
Updated on 09-Aug-2023 14:16:18

419 Views

Optimizing MySQL tables is a crucial step in improving the performance and efficiency of your database. By employing effective optimization techniques, you can enhance query execution speed, reduce storage requirements, and optimize resource utilization. This article explores various strategies and best practices to optimize MySQL tables, allowing you to maximize the performance of your database-driven applications. In this guide, we will discuss the importance of analyzing table structure and design, selecting appropriate data types, and normalizing the database schema. We will also delve into indexing strategies, including identifying indexing opportunities and optimizing indexes for query performance. Additionally, we will explore ... Read More

Previous 1 ... 4 5 6 7 8 ... 671 Next
Advertisements