Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Describe the types of attributes?
Types of attributes: An attribute's category determines the type of values that are permitted in the attribute. For instance, the value version 1 is not valid for an attribute described as an integer, but the value 1 is valid. Numeric types (such as integer or real) can also be limited to a predefined range through their attribute definition.
Choice : An attribute along with a list of predefined values.
ID Reference: An attribute along with a value which is a Unique ID value from another element. It is typically used for element-based cross-references.
ID References: An attribute along with a value of one or more Unique ID values from another part.
Integer: An attribute along with a whole number value (no decimal parts). Examples of valid integers are 22, -22, and +322. An integer could be described to fall within a range.
Integers: An attribute along with a value of one or more integers. Enter each number on a separate line within the Attribute Value text box. Real An attribute along with a real number value, with or without a decimal part (the value could also be expressed within scientific notation). Examples of valid real numbers are 2, 22.4, -1 0.22, and 2.3e. A real number could be described to fall inside a range.
One-to-many : An entity in A is related with any number of entities in B. An entity in B is related with at the most one entity in A. Example: Relationship between faculty and d
Describe integrity and security? a) Domain constraint b) Referential integrity A value that appears in one relation for a given set of attributes also appear fo
Explain Hashing techniques The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with
Which language has presently become the defacto standard for interfacing application programs along with relational database system? The language which has recently become the
Define the phases of two phase locking protocol Growing phase: a transaction may get locks but not release any lock. Shrinking phase: a transaction might be release locks bu
Develop a database broker framework to implement a persistence mechanism for the domain objects involved in the use case dealt with in Question 2. a. Specify the attribute type
Differance between Open addressing and chaining for collision resolution ? In open addressing , proceeding from the occupied position specified by hash address the program che
Use a Set operator to create a list of academics who have written or co-written less than 5 papers and also have greater than 3 interests. List their academic number in the output.
Failures and Recovery In practice various things might occur to prevent a transaction from completing. Recovery methods are used to bring database, which does not satisfy consi
Insertion Anomaly: Inability to show certain information-The primary key of the over relation be (enrolment number, Cno). Any new tuple to be inserted in the relation should have
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd