Explain about the Physical Data Model?
A physical data model (a.k.a. database design) is a
representation of a data design which takes into account the
facilities and constraints of a given database management
system. In the lifecycle of a project it is typically
derived from a logical data model, though it may be
reverse-engineered from a given database implementation. A
complete physical data model will include all the database
artifacts required to create relationships between tables or
achieve performance goals, such as indexes, constraint
definitions, linking tables, partitioned tables or clusters.
The physical data model can usually be used to calculate
storage estimates and may include specific storage
allocation details for a given database system.
The Physical Data Model (PDM) describes how the information
represented in the Logical Data Model is actually
implemented, how the information-exchange requirements are
implemented, and how the data entities and their
relationships are maintained.
There should be a mapping from a given Logical Data Model to
the Physical Data Model if both models are used. The form of
the Physical Data Model can vary greatly. For some purposes,
an additional entity-relationship style diagram will
suffice. The Data Definition Language (DDL) may also be
used. References to message format standards (which identify
message types and options to be used) may suffice for
message-oriented implementations. Descriptions of file
formats may be used when file passing is the mode used to
exchange information. Interoperating systems may use a
variety of techniques to exchange data, and thus have
several distinct partitions in their Physical Data Model
with each partition using a different form.
| Is This Answer Correct ? | 1 Yes | 0 No |
What are the rules regarding quotation marks?
please suggest me final year project ideas for computer engg.on java as soon as possible becaus eo want to sumbit project name. and i am very confused.
How can you work with permissions from your .net application? : java security
How do I install eclipse?
What is the first argument of the string array in main method?
explain isalive() method under thread class?
I run a web server. Am I at risk? : java security
What is the difference between deep copy and shallow copy in java
why i can not access private variable in other class?
What is type inference? Is type inference available in older versions like java 7 and before 7 or it is available only in java se 8?
What is entitymanager in jpa?
Why sun introduce concept of anonymous class? What is need and real life use of anonymous class