Explain two major components of sql

Assignment Help Basic Computer Science
Reference no: EM131077290

Answer each of the following questions labeling your answers clearly. Save your work in the Desire 2 Learn Dropbox for Week 06 - Review Questions.

1. What type of integrity is enforced when a primary key is declared?

2. Explain why it might be more appropriate to declare an attribute that contains only digits as a character data type instead of a numeric data type.

3. Explain two major components of SQL.

4. What is the difference between a column constraint and a table constraint?

5. Write the SQL command that will create a user-defined data type called KEY_CODE for all the primary keys containing character values with a length of 7.

6. Within the context of a database, explain authentication.

7. What is the objective of SQL?

8. Describe the two types of tables that exist in a database.

9. What are "referential constraint actions"?

10. Write the SQL command that will delete the EMPLOYEE table from the database.

11. Explain why it would be preferable to use a DATE data type to store date data instead of a character data type.

12. What is a database?

13. What is a user-defined data type?Why is it used?

14. Describe the purpose of the IDENTITY property.

15. Within the context of a database, what are constraints?

16. If you create a database called inventory, what two files are created?

17. Within the context of a database, what is a table?

18. What special meaning does using the @, @@, # and ## symbols have at the beginning of an identifier?

19. List and explain three constraints.

20. Write the SQL code command that will drop the PAYROLL database.

Reference no: EM131077290

Questions Cloud

Determining the rest for kernel data : Assuming 64KB of program flash memory and 64KB of data SRAM, assign values to BMXxxxBA special function registers to partition the program flash memory into 50KB for kernel program and rest for user program; and partition the data SRAM into 10KB f..
Data warehouse consists of four dimensions : Suppose a market shopping data warehouse consists of four dimensions: customer, date, product and store and two measures: count and avg_sales, where avg_sales stores the real sales in dollar at lowest level but the corresponding average sales at o..
Create a power point slide show : Choose an historical event, short story, speech, or other document, create a power point slide show from the document. The slide show has a title slide that displays your name and the title of your slide show, table of contents slide that provides..
Corresponding iceberg cube : Data Warehousing and OLAP for data mining (a) Suppose the base cuboid of data cube contains only two cells (a1, a2, a3 ...a10) (b1, b2, b3 ....b10) Where ai = bi where i is an odd number otherwise ai ≠ bi.
Explain two major components of sql : 1. What type of integrity is enforced when a primary key is declared? 2. Explain why it might be more appropriate to declare an attribute that contains only digits as a character data type instead of a numeric data type. 3. Explain two major compon..
Workbook and a worksheet group in excel : What is the difference between a Workbook and a Worksheet group in excel?
How it work in a pseudocode : What three elements are used to make a loop work? How's it work in a pseudocode?
Tunnel cost comparisons : Search the internet for the link to the Boston tunnel, "the Big Dig" or the "Channel Tunnel," and London's Millennium Dome. In spite of their poor cost performance, why do you think these projects were supported to their conclusion? What would it ..
Adaptive tree walk protocol : Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention?

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  The basic sociological fact in buddhism

1. The basic sociological fact in Buddhism is _______. a. Karma b. Samgha

  Explaining formal risk assessment of desktop systems

As apart of a formal risk assessment of desktop systems in small accounting firm with limited IT Support, you have identified asset "integrity of customer and financial data files on desktop systems" and threat.

  Computer security threat

Choose a computer security threat and create a PowerPoint presentation that examines the threat and proposes a solution or solutions. Your presentation should be a minimum of 10 slides in length. Content to be covered includes:

  Discuss the issues of encryption and key management

Discuss the issues of encryption and key management in cloud computing, how it different for personal computers and traditional enterprising computing environments.(1300-1400 words)

  Creating a database in sql for recreation

Members of a small town in Tennessee are tired of having nothing to do on the weekend.  They want to start a local club where people can pay a monthly fee to be a member and participate in various activities.

  Describe two advantages of modular design

Describe two advantages of modular design, and give a real business example of how the benefits can be achieved.

  Question regarding the cost-benefit analysis

Suppose that you are interested in buying yourself a new computer. Create a cost-benefit analysis that illustrates the return on investment that you would receive from making this purchase.

  Which search engine do you believe provided

Which search engine do you believe provided you the best results? Support your position by explaining why you believe the particular search engine to be better based upon your experience.

  Physical therapy

Looking for Microsoft Office 2013: Advanced Capstone Project 2 BJM Physical Therapy. Willing to pay whatever is needed for it completed. Need before Sunday 4/24. Anything helps, greatly appreciated.

  Write a java program that creates an array of integers

It should also keep track of a value that appears most often, display what that value was, and how often that value appeared in the array. You may simplify by filling myArray with values such that only one value appears most often.

  Create the header comment and the prototype for the function

Create the header comment and the prototype for the function.

  What is the function of monetary policy

What is the function of monetary policy and the consequences of it?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd