Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Creation of Indexes
Automatically: When a primary key or Unique constraint is show in a table definition then a unique index is formed automatically.
Manually: User can form non-unique indexes on columns to speed up access time to rows.
Example: The following commands produce index on employee name and employee name + department number respectively.
CREATE INDEX EMP_ENAME_IDX ON EMP (ENAME);
CREATE INDEX EMP_MULTI_IDX ON EMP (ENAME, DEPTNO);
Finding facts about created indexes: The data dictionary have the name of index, table name and column names. For instance, in Oracle a user-indexes and user-ind-columns see contains the details about user formed indexes.
Remove an index from the data dictionary:
DROP INDEX EMP_ENAME_IDX;
Indexes cannot be modified.
Cardinality of Relationship One-to-One Only one entity of the first set is linked to only one entity of the second set. E.g. A teacher teaches a student. Only one teacher
Explain the two types of participation constraint. 1. Total: The participation of an entity set E in a relationship set R is said to be total if each entity in E participates i
Concurrency Identification While designing analysis, model we map real world model into our analytical model. Real life objects are simultaneous in nature, but all the design
what are the topics in data management
Explain the difference between the three storage types - volatile, non volatile and stable. Ans: Volatile storage: if storage media loses data while power goes off,
(a) Data Mining Process : In the context of this cluster analysis project , and in your own words , explain how you would execute the first stage of data mining, namely the "P
2NF Normal Form : A relation schema process R is in 2NF if it is in 1NF and each non-prime attribute A in R is fully functionally related on primary key. Second normal form (2N
Differance between Open addressing and chaining for collision resolution ? In open addressing , proceeding from the occupied position specified by hash address the program che
create an e-r diagram usuing graphical dipicted software that could theoritically be used in resturant application
usecase diagram,activity diagraM,SEQUENCE DIAGRAM
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd