Unit Iv
Unit Iv
IMPLEMENTATION TECHNIQUES
PART – A
1. What is the need of RAID? [May - 2013]
To increase performance
Increase reliability
Give greater throughput than a single disk
Even when disk failure replacement disk installed and data restored
10. When is it preferable to use a dense index rather than a sparse index? Explain
your answer. [Dec - 2011]
It is preferable to use a dense index instead of a sparse index when the file
is not shorted on the indexed filed.
When the index file is small compared to the size of memory.
11. How does B -tree differs from a B+ tree? Why is a B+ tree usually preferred as
an access structure to a data file?
In B+ tree data stores in leaf node only and searching is easy. It has redundant
search key and does not waste space. In B tree both keys and data stored in internal
and leaf nodes. Difficult to search
12. Define Static Hashing.
No space for some data entry, allocate new overflow page.
The data record onto the page and add the page to overflow chain
14. What are the disadvantages of B tree over B+ tree. [Dec - 2016]
Searching of a key value becomes difficult in B- tree as data can not be found
in the leaf node.
The leaf node can not store linked list and thus wastes the space.
15. Mention different hashing techniques. [May - 2012]
Two types of hashing techniques are
Static Hashing
Dynamic Hashing
16. List the mechanisms to avoid collision during hashing. [Dec – 2016]
Separate chaining
Open addressing techniques
Linear probing
Quadratic probing
17. What is basic difference between static hashing and dynamic hashing?
[May – 2013, 2015 Dec – 2014, 2015]
S.No Static Hashing Dynamic hashing
1 The number of buckets are fixed The number of buckets are not fixed
2 Chaining is used There is no need of Chaining
3 Open hashing and closed hashing Extendible hashing and linear hashing
are forms of static hashing are forms of dynamic hashing
4 Minimum space overhead due to
Space overhead is more
dynamic nature
5 As file grows the performance of There is no degradation in performance
static hash function decreases when the file grows
6 The bucket address table is not
The bucket address table is required
required
7 The bucket address table is used to
The bucket is directly accessed
access the bucket