18 pages matching monitor in this book
Results 1-3 of 18
What people are saying - Write a review
We haven't found any reviews in the usual places.
Logical Structuring and Data Independence
Security and Integrity
5 other sections not shown
access control Access Method ADABAS allocated allows application programs batch buffer pool called Central Version CODASYL contains control field control key copy Data Base Data Description Language data independence Data Manipulation Language data structures database key database record DBMOD DBMS defined deleted dependent segments described Entry Data Set ESDS records facilities Figure five DBMSs format free space group field HDAM HIDAM hierarchical host language identified IDMS implemented IMS-DLI1 interface linked linkpath loaded location mode locked logical structure Master Data Set member records modules monitor on-line operating system optimise optionally overflow owner parameters performance physical block physical database file pointer array preprocessor reorganised request response code retrieval run-unit schema segment type sequence Sequential Access SHSAM space management specified stored subschema tape teleprocessing tion TOTAL update utility Variable Entry Data virtual machines VSAM VSAM ESDS