Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:(a) The objective of query optimization is to choose the most efficient strategy for implementing a given relational query, thereby improving the system performance. One of the stages of query optimization is to convert the internal form into equivalent and more efficient canonical form, using well-defined transformation rules. Two rules of the transformation rules is given below:Rule 1 - Transform a sequence of restrictions against a given relation into a single (ANDed) restriction.Rule 2 - Transform a restriction of a projection into a projection of a restriction.(i) Explain what is meant by each of the above rules.(ii) Using the relational schema given in Appendix, provide example of each of the above rules.(b) Refer to the relational schema given in Appendix.Assuming that: The Employee relation contains 1000 records among which 300 employee are assigned to departments located in the United States.- The Department relation contains 30 records among which 20 departments are located in United States- The Location relation contains 20 records among which 5 are situated in the United States.(i) Express the following query in SQL:"find the employee Last names and the department names who are working in United States (Location.country_id = US)(ii) Choose two possible methods to evaluate the query, and use the relational algebra to formulate clearly all the steps required in the evaluation. For each method, calculate the number of tuples for all the intermediate relations (namely, size of the intermediate relations) required for each step.
Predefined Exceptions The internal exception is raised implicitly whenever your PL/SQL program exceeds a system-dependent limit or violates an Oracle rule. Each & every Oracle
Question: (a) In the context of database security explain how the following database features help to enforce security in the database system: (i) Authorisation (ii) Access
LOOP Statements The LOOP statements execute a series of statements at multiple times. The loops enclose the series of statements that is to be repeated. The PL/SQL provides typ
Definition of CROSS JOIN - SQL Let s = t1 CROSS JOIN t2, where t1 and t2 are table expressions optionally accompanied by range variables. Then: Note: Here T denotes Table
Question 1 . Compare SQL and PL/SQL Question 2 . Write a database trigger to implement the following check condition Given the following table
Data Types and Representations This explains the concept possible representation, abbreviated possrep, and explains how these can be used in conjunction with constraints to de
DBMS_PIPE: The Package DBMS_PIPE allows various sessions to communicate over the named pipes. (A pipe is a region of memory used by one of the process to pass information to
Example of UNWRAP Operator - SQL Example here shows how unwrapping can be done in longhand in SQL. Example: Unwrapping in SQL Letting CONTACT_INFO_WRAPPED denote the res
Implicit Rollbacks Before execute the INSERT, UPDATE, or DELETE statement, the Oracle marks an implicit savepoint . When the statement fails, the Oracle rolls back to the save
Keyword & Parameter Description: PRAGMA: These keywords signify that the statement is a pragma (i.e. compiler directive). The Pragmas are processed at the compile time, n
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd