Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Create table employee and enter employee data in SQL?
Consider the following relational schemas: EMPLOYEE (EMPLOYEE_NAME, STREET, CITY) WORKS (EMPLOYEE_NAME, COMPANYNAME, SALARY) COMPANY (COMPANY_NAME, CITY) Specify the table definitions in SQL.
Ans. CREATE TABLE EMPLOYEE( EMPLOYEE_NAME VARCHAR2(20) PRIMARY KEY,STREET VARCHAR2(20),CITY VARCHAR2(15));CREATE TABLE COMPANY( COMPANY_NAME VARCHAR2(50) PRIMARY KEY,CITY VARCHAR2(15));CREATE TABLE WORKS( EMPLOYEE_NAME VARCHAR2(20)REFERENCES EMPLOYEE(EMPLOYEE_NAME,COMPANYNAME VARCHAR2(50)REFERENCES COMPANY(COMPANY_NAME,SALARY NUMBER(6),CONSTRAINT WORKS_PK PRIMARY KEY(EMPLOYEE_NAME, COMPANY_NAME));
Views in relational algebra: 1. Basic expression contains either a) A relation in the database. b) A constant relation. 2. General expressions are madde out of sma
Using Literal Character String Example: To print IS A as one string with column name employee SELECT ENAME || ' IS A ' || JOB AS "EMPLOYEE" FROM EMP;
Define According to the levels of abstraction, the schema at the intermediate level is called Ans: As per to the levels of abstraction, the schema at the intermediate level is
explain in details about one to one binary relationship
Explain the Fundamental concepts of object-orientation Software developers, data base administrators (DBAs) need to be familiar with fundamental concepts of object-orientation.
Software failures : In such cases, a software error abruptly stops the implementation of the current transaction (or all transactions), therefore leading to losing the state of pr
Define the Wait for graph Ans: The wait-for-graph is a directed graph and consist of nodes and directed arcs; the nodes of the graph are active transactions. An arc of the grap
Authorisation Authorisation is the culmination of the administrative policies of the organisation. As the name shows, authorisation is a set of rules that can be used to verif
Give some encryption techniques? A) DES B) AES C) Public key encryption
Evaluate, compare and contrast the two methods of relational database design namely top down method and Bottom up method. What will be your choice if you are asked to select a meth
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd