Explain weak and strong entity sets, Database Management System

Assignment Help:

Explain weak and strong entity sets?

Weak and Strong entity sets: A physically powerful entity set has a primary key. All tuples in the group are distinguishable through that key. A weak entity set has no primary key unless attributes of the tough entity set on which it depends are included. Tuples in a weak entity grouped are partition according to their relationship along with tuples within a strong entity set. Tuples inside each partition are discernible by a discriminator, that is a set of attributes. A strong entity set has a primary key. All tuples within the set are distinguishable through that key. A weak entity set has no primary key unless attributes of the strong entity set on that it depends are included. Tuples in a weak entity set are partitioned according to their relationship along with tuples in a strong entity set. Tuples within each partition are discernible through a discriminator that is a set of attributes.


Related Discussions:- Explain weak and strong entity sets

Prepare a data flow diagram for computing the volume, Prepare a data flow d...

Prepare a data flow diagram for computing the volume and surface area of a cylinder. Inputs are the height and radius of the cylinder. Outputs are the volume and surface area of th

01a_ImportCasting.xlsx, 01a_Broadway_LastFirst_yyyy-mm-dd Capstone Exercise...

01a_Broadway_LastFirst_yyyy-mm-dd Capstone Exercises You work as a production assistant in the office of the Green Man Theatre. One of your duties is to maintain the company datab

Issues relating to the design of the physical database files, The issues re...

The issues relating to the Design of the Physical Database Files Physical File is a file as stored on the disk. The major issues relating to physical files are:  •      Cons

What are the advantages of having an index structure, What are the advantag...

What are the advantages of having an index structure?      Ans: The index structures commonly provide secondary access paths, which offer alternative ways of accessing the reco

Cluster analysis project, (a) Data Mining Process : In the context of t...

(a) Data Mining Process : In the context of this cluster analysis project , and in your own words , explain how you would execute the first stage of data mining, namely the "P

Schema, difference between internal schema and external schema in DBMS

difference between internal schema and external schema in DBMS

What is 2nf, What is 2NF? A relation schema R is in 2NF if it is in 1NF...

What is 2NF? A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R is fully functionally dependent on primary key.

Alter table command, ALTER TABLE Command : This command is used for variati...

ALTER TABLE Command : This command is used for variation of existing structure of the table in the given situation: When a new column is to be added to the table structure.

Strong entity set and weak entity set, Strong entity set and weak entity se...

Strong entity set and weak entity set? Strong entity set and weak entity set: A strong entity set has a primary key. All tuples in the set are distinguishable through that key.

RAID technology, what characterizes the levels in RAID technology

what characterizes the levels in RAID technology

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd