N-ary relationships in database design, computer science, Basic Computer Science

n-ary relationships in database design

Each n-ary where n>2 relationship type is maped into a table name of the relationship works as the name of the table.
The primary key of such kind of table is the combination of the primary keys of the participating entity types.
These are also defined a foreign keys.
Attributes of the relationship type maps to attributes of the table, same as to those of regular entity types.
Posted Date: 2/14/2012 1:53:05 PM | Location : United States







Related Discussions:- N-ary relationships in database design, computer science, Assignment Help, Ask Question on N-ary relationships in database design, computer science, Get Answer, Expert's Help, N-ary relationships in database design, computer science Discussions

Write discussion on N-ary relationships in database design, computer science
Your posts are moderated
Related Questions
#whatis cai?and its pit fallsquestion..

They are used to evaluate operators, and they have an effect on the content of the flags. CMP CMPS (CMPSB) (CMPSW) CMP INSTRUCTION Idea: To measure up to the operators. Syntax: CMP

Ask questioMost part of power consumption in data centers comes from computation processing, disk storage, network and cooling systems. Nowadays, there are new technologies and met

SPECIAL-PURPOSE AND GENERAL-PURPOSE COMPUTERS In general, there are two types of digital computers. The first is the special-purpose digital computer, which performs a f

Two-tiered architecture: This approach basically introduced a database server to replace the file server. The emergence of relational database management systems and graphica

write advantages and disadvantages of private and public network

Question 1 What is mobile telephone initialization? Explain the three main goals of this procedure Define GSM system operations Introduction to mobile telephone initializ

Looping Statement:  The purpose of a loop structure is to repeat certain tasks until some condition is satisfied. Several variations of a loop structure are available in each pro

Problem 1. Obtain the set of prime implicants for f = Σ m (0,1,6,7,8,9,13,14,15) . Obtaining the set of prime implicants: 2. Draw the logic diagram of a divide by

Write a half-page summary explaining IP spoofing.