Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is inheritance? Define it in detail?
Inheritance
Inheritance can be at the levels of types, or at the level of tables we first consider inheritance of types, then inheritance at the level of labels.
Type inheritance
Assume that we have the following type definition for people
create type person
(name varchar(20)
address varchar(20))
Table inheritance
Create table people of person
The consistency requirements for sub tables are
1. Each tuple of the sub table can correspond to at most single tuple in each of its immediate sub tables.
2. SQL:1999 has an additional constraint that all the tuples corresponding to each other must be derived from single tuple .
First Normal Form and second normal form First Normal Form (1NF) A relation is said to be in 1NF if it having no non-atomic values and each row can give a unique combinat
Problem: a) Briefly describe what you understand by Client-Server environment b) The File Server is a simple form of Client-Server. Describe the principles of the File Serve
List the requirements needed to design a trigger. The requirements are:- Specifying when a trigger is to be implemented. State the actions to be taken when the trigger im
To eliminate duplicate rows (distinct operator) Example: SELECT DISTINCT DEPTNO FROM EMP;
What is trigger Triggers are statements that are implemented automatically by the system as the side effect of a change to the database.
State as Location within a Program In this traditional approach, location of control inside a program totally defines the program state. Any finite state machine may be implem
Explain data independence ? Data independence is the capacity to modify the schema at one stage of a database system without having to change the schema at the further level.
The database files accept the actual data and are typically the biggest in size. Depending on their shape, the tables for all the user operation can go in one database file-but
What is vertical fragmentation? Vertical fragmentation divides the relation by decomposing the scheme R of relation r.
Explain Two phase locking protocol A transaction is consider as to follow the two-phase locking protocol if all locking operations precede the first unlock operation in the tra
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd