Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Describe entity referential integrity and integrity. Give an example of each.
Entity Integrity Rule - If there is a attribute A of relation R is a prime attribute of R then A cannot accept null values.
Referential Integrity Rule - In referential integrity, it is ensured in which a value in which appears in one association for a given set of attributes also appears for a certain set of attributes in another relation.
For example:
Roll No is the primary key within the relation STUDENT and Roll No + Course is the primary key of the relation GRADE. (Entity Integrity) Roll No in the relation GRADE (child table) is a foreign key, which is referenced from the relation STUDENT (parent table). (Referential Integrity).
What is inheritance? Inheritance is an object orientation concept that allows reusability of code / design. Basic sense of inheritance is that if one class is predefined than a
Consider the relations EMPLOYEE(emp#, name) ASSIGNED_TO(project#, emp#) PROJECT(project#, project_name, chief) Express the subsequent queries in Relational Algebra (i) Ge
Question: Data Mining is the process of extracting knowledge hidden from large volumes of raw data. (a) Using a suitable example, illustrate how Data Mining can be useful t
Define average latency time. The average latency time of the disk is one-half the time for a full rotation of the disk.
In object oriented design, which steps must designer take to adjust inheritance? To readjust inheritance following steps should be taken: i) Rearrange and adjust the classe
List the Armstrong's axioms for functional dependencies. What do you understand by soundness and completeness of these axioms? Ans: The Armstrong's axioms are: F1:
What are the advantages of creating a table from existing table?
Which method is used to key transformation ? A hash method is used to key transformation.
Explain the EXEC statement in SQL Ans: All statements which start with EXEC SQL are embedded SQL database statements. High level languages such as C can be employed to write a
Define the Two Phase Locking Protocol This is a protocol that is used to make sure serializability of transactions. This protocol needs that every transaction issue lock and u
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd