Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the differences among MySQL_fetch_array(), MySQL_fetch_object(), MySQL_fetch_row()?
Mysql_fetch_object returns the result from the database like objects while mysql_fetch_array returns result as an array.
This will permit access to the data via the field names E.g. using mysql_fetch_object field can be accessed as $result-
>name andusing mysql_fetch_array field can be accessed as $result->[name].
mysql_fetch_row($result):- where $result is the result resource come back from a successful query executed using the mysql_query() function.
Illustration:
$result = mysql_query("SELECT * from students);
while($row = mysql_fetch_row($result))
{
Some statement;
}
How can Redundant Associations be done It can be done by asking questions: i) Is there a specific arrangement of network which would optimize critical aspects of completed
Define reference file
Explain mechanism of nested queries? SQL gives a mechanism for nesting subqueries. A subquery is a select from where expression that is nested within one more query. A common u
Column Constraints: NOT NULL, UNIQUE, CHECK, PRIMARY KEY, DEFAULT, REFERENCES, On delete Cascade : Using this key whenever a parent row is removed in a referenced
What are the disadvantages of file-processing system? Ans: The Disadvantages of File-Processing System a. Data redundancy and inconsistency - Data redundancy means not nece
What are the uses of functional dependencies? To test relations to see whether they are legal under a given set of functional dependencies. To state constraints on the set
Define physical and logical data independence. How does this architecture help in achieving these? Data independence entails that change in one view must not need a change in t
how map binary relation one to one
Explain the Dynamic Hashing Techniques There are two methods in it: extendible hashing - stores an access structure in addition to the file, and therefore is somewhat identica
Different stages of DDLC ?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd