Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Define multivalued dependency and 4NF.
Ans: Multivalued Dependency - Assume R be a relation schema and let α ⊆ R and β ⊆ R. The multivalued dependency
α →→β
holds on R if, in any type of legal relation r(R), for all pairs of tuples t1 and t2 in r like that
t1[α] = t2[α], there exist tuples t3 and t4 in r like
t1[α] = t2[α] = t3[α] = t4[α]
t3[β] = t1[β]
t3[R - β] = t2[R - β]
t4[β] = t2[β]
t4[R - β] = t1[R - β]
Fourth Normal Form (4 NF) - A relation schema R is in 4NF regarding to a set D of functional and multivalued dependencies if, for all multivalued dependencies in D+ of the
form α →→β, in which α ⊆ R and β ⊆ R, at least one of the subsequent holds:
How can you map NULL values to other values while display? IF( ) , IFNULL( ) keywords are used to do so. They are 'LIMIT' is used for the following kinds of problems: 1) Ans
Define weak and strong entity sets? Weak entity set: entity set that do not have key attribute of their own are known as weak entity sets. Strong entity set
Database Recovery And Security Introduction In this part we will introduce two main issues relating to database management systems. A computer system suffers from dissi
Table_Name( attribute_1, attribute_2, attribute_3, ….. ,attribute_x) Primary Key ( attribute_1, attribute_2) Foreign Key attribute_4 References Table_Name_2 (repeat for each fore
Explain the concept of QBE? Query-by-example represents a visual/graphical approach for accessing information in a database by the use of query templates called as skeleton tab
Explain Dynamic Two-Phase Locking Here a transaction locks a data item instantly earlier than any operation is applied on the data item. After finishing all the operations on
Draw the precedence graph of the following schedule and determine whether the schedule is serializable. (Note that all instructions, except lock and unlock, are omitted. We assume
Which method is used to key transformation ? A hash method is used to key transformation.
What is OLAP? OnLine Analytical Processing (OLAP) is a Business Intelligence (BI) reporting system. OLAP gives the user with the capability to sum, count, average and do other
What is foreign key? A relation schema r1 derived from an ER schema may contain among its attributes the primary key of another relation schema r2.this attribute is known as a
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd