Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Describe the types of attributes?
Types of attributes: An attribute's category determines the type of values that are permitted in the attribute. For instance, the value version 1 is not valid for an attribute described as an integer, but the value 1 is valid. Numeric types (such as integer or real) can also be limited to a predefined range through their attribute definition.
Choice : An attribute along with a list of predefined values.
ID Reference: An attribute along with a value which is a Unique ID value from another element. It is typically used for element-based cross-references.
ID References: An attribute along with a value of one or more Unique ID values from another part.
Integer: An attribute along with a whole number value (no decimal parts). Examples of valid integers are 22, -22, and +322. An integer could be described to fall within a range.
Integers: An attribute along with a value of one or more integers. Enter each number on a separate line within the Attribute Value text box. Real An attribute along with a real number value, with or without a decimal part (the value could also be expressed within scientific notation). Examples of valid real numbers are 2, 22.4, -1 0.22, and 2.3e. A real number could be described to fall inside a range.
Discuss the problem of Spurious tuples and how we may prevent it. Ans: A spurious tuple is, mainly, a record in a database that gets created while two tables are joined bad
can you please explain with the help of suitable example the difference between conflict equivalence and conflict serializability?
Define Two phase commit Two phase commit: To make sure atomicity, all the sites where a transaction is being executed must agree on the final outcome of the execution. The tran
Determine the rule that a value of a foreign key should appear as a value of some particular table is called a Ans: Referential constraint. The rule that a value of a fo
Use of partial data by applications : In common, applications work with views rather than whole relations. Thus, it may be more appropriate to work with subsets of relations rather
The following variant of the primary copy asynchronous-update replication protocol has been proposed for totally replicated systems. (a) A transaction executing at site A updat
Data Replication "If a relation R has its copies kept at two or more sites, then it is considered replicated". But why do we replicate a relation? There are several advan
Explain current page table and shadow page table. The key idea behind the shadow paging method is to maintain two page tables during the life of the transaction: the current pa
Define the Boyce-Codd Normal Form with instance and also Compare BCNF and 3NF. Ans: BCNF: For each functional dependency X->Y in a set F of functional dependencies over relati
System error :These contain errors in database system or the OS, example, deadlocks.Such errors are fairly hard to detect and need reprogramming the erroneous components of the sys
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd