Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

what's advantage has indexed file over the hashed files and what's advantages has hashed files over indexed?

Posted on 2011-03-23
3
Medium Priority
?
615 Views
Last Modified: 2012-06-27
what's advantage has indexed file over the hashed files and what's advantages has hashed files over indexed?
0
Comment
Question by:antatiana
2 Comments
 
LVL 65

Expert Comment

by:btan
ID: 35207814
check out this and mainly their application are in search purposes where both fared better uniquely than sequential file search. simply have algorithm efficiency and space optimisation as comparison factors

http://markp3rry.blogspot.com/2007/12/indexed-vs-hashed-files.html

"...indexes are best used when there are no limits on storage space - a large database will always have space available for indexes because of the extra efficiency in searching. Also , I think that indexes are less prone to errors than hashing files - no chance of collision or clustering . However hashing isn ' t as wasteful in terms of needing extra resources to implement, and is quicker when done properly because there aren ' t two files to maintain."
0
 
LVL 6

Accepted Solution

by:
Melannk24 earned 2000 total points
ID: 35210446
Records in hashed files can be stored and retrieved quickly. However the difficulty in hashed files is that they are difficult to process in key order, which is important if you want to access all records with keys in a certain range.

Indexing is a data structure based technique for accessing records in a file.  Indexes are auxiliary access structures which are used to speed up the retrieval of records in response to certain search conditions.  A main file of records can be supplemented by one or more indexes. Indexes allow for efficient access to records based on the indexing fields that are used to construct the index.   Any field of the file can be used to create an index, and multiple indexes on different fields can be constructed on the same file.

IMO, hash files are quick where indexing can consume both time it takes to perform the index and space required.  Depends on the purpose of the database and environment limitations.
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Finding a job can be stressful - searches, resume tweaks, and networking events can be super boring. Luckily we're here to help you land your dream job!
Want to know how to use Exchange Server Eseutil command? Go through this article as it gives you the know-how.
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
Suggested Courses

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question