What is the use of group by clause, Database Management System

What is the use of group by clause? 

Group  by  clause  is  used to apply  aggregate  functions  to a  set  of  tuples. The attributes given in the group by clause are used to form groups. Tuples with the similar value on all attributes in the group by clause are placed in one group

 

Posted Date: 7/27/2013 7:11:44 AM | Location : United States







Related Discussions:- What is the use of group by clause, Assignment Help, Ask Question on What is the use of group by clause, Get Answer, Expert's Help, What is the use of group by clause Discussions

Write discussion on What is the use of group by clause
Your posts are moderated
Related Questions
The indices are accumulated in the index files. The data is accumulated in the data files. Indices give fast access to data items. For example, a book database may be managed in th


QUESTION (a) Consider a car database consisting of car model, car make, car origin, Engine capacity, color, cost.

Which data type can store unstructured data? Raw data type can store unstructured data.

Why do you go for sorting your query results? SQL SELECT command to fetch data from MySQL table. Whenever you select rows, the MySQL server is free to return them in any order

What is a foreign key, and what is it used for? A foreign key is used to establish relationships between relations in the relational model. Technically, a foreign key is a colu

Project Description: Oracle Certified Professional with 20 years of practice, Oracle version 6.0.34, 7.3, 8.0, 8i, 9i, 10G, 11G, 12C. Crossplatform migration, Informix, MSSql

Define canonical cover? A canonical cover Fc for F is a set of dependencies like F logically implies all dependencies in FC and Fc logically shows all dependencies in F.

Question: (a) Discuss the difference between a composite key and a composite attribute. How would each be indicated in an E-R diagram? Support your answer with appropriate exam

Part 1: Security Plan Consider the Case study and identify 3 security requirements. For each of these security requirements: • Discuss the necessity for the feature and how