1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
8

You need to design a data storage scheme for Hayseed Heaven library data system. There are several hundred thousand large data r

ecords. You expect frequent insertions/deletions as well as frequent queries, involving multiple attributes. There is no requirement for printing the file in order. You may assume the initial file is available sorted. The queries are in real time and primarily occur on the ISBN number, title, and author fields. There are occasional queries on the publisher and subject fields of the record. You may make reasonable assumptions about hardware availability. The entire system is archived monthly. What do you propose and why
Computers and Technology
1 answer:
Alekssandra [29.7K]3 years ago
7 0

Answer:

Make use of hash tables

Explanation:

The appropriate thing to use for this should be a hash table.

A Hash Table can be described as a data structure which stores data in an associative manner. In a hash table, data is stored in an array format, where each data value has its own unique index value. Access of data becomes very fast if we know the index of the desired data. So we can perform Hashing on ISBN Number since its unique and based on the Hash Function w ecan store the Information record.

There is no requirement for printing the file in order - HashTables dont store the data in order of insertions, so no problems with that

It becomes a data structure in which insertion and search operations are very fast irrespective of the size of the data. So Querying books details can be fast and searching will take less time.

It can also be pointed out that it wont be too expensive for Hardware implemtation as HashTables stores data based on Hash Functions and memory consumption is also optimal which reduces memory wastages.

You might be interested in
An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task schedu
yarga [219]
<span>I would say a cyber attack.since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.</span>
5 0
3 years ago
Que son los sistemas de control con retroalimentacion
iren2701 [21]
Existen 2 clases comunes:
sistema de lazo abierto: la salida no efecto sobre el sistema
sistema de lazo cerrado: la toma de desiciones del sistema de la entrada si no también de la salida
5 0
3 years ago
How to determine the critical crack size for a<br> plate
Blababa [14]
Wait what? is that really a question orr
7 0
3 years ago
Sending a employee an email with important criticism represents a problem which communication process
Evgen [1.6K]
<span>I am definitely sure that sending an employee an email with important criticism represents a problem in message channel. Message channel is one of the ways through which two parties (manager-employee) communicate with each other.</span>
7 0
3 years ago
Which components of the​ five-component model is commonly thought of as the​ "bridge" that links the computer side of the model
-Dominant- [34]

Answer:

The correct answer to the following question will be "Data".

Explanation:

  • Data would be any series of one or even more signs which are given significance by unique classification action. To become knowledge the data needs to be interpreted.
  • Data is generally considered to be the "bridge" that connects the designer's machine part with the practical side.

Therefore, this will be the right answer.

3 0
3 years ago
Other questions:
  • A user of the wireless network is unable to gain access to the network. The symptoms are:1.) Unable to connect to both internal
    6·1 answer
  • Write an if statement that assigns 100 to x when y is equal to 0.
    7·1 answer
  • How is a technical certificate like a computer-related associate degree?
    12·2 answers
  • The theory of logic set the foundation for what aspect of computing today?
    11·1 answer
  • Is a biometric system an input, output, storage or soft device?​
    6·1 answer
  • Lori Redford, who has been a member of the Project Management group, was recently promoted to manager of the team. She has been
    12·1 answer
  • Can someone please help me to point out what's wrong with this C program:
    13·1 answer
  • Launa is reviewing several videos from her friends doing the latest dance challenge before they are published on their own
    11·1 answer
  • Copying materials from a source text without using is<br> considered plagiarism<br> ?
    5·1 answer
  • When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is mos
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!