Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Describe the Composite Key
Composite Key: Sometimes one key is not enough to uniquely recognize a row. E.g. in a single class Roll is enough to search a student, but in the whole school, merely searching by the Roll is not enough, because there could be 10 classes in the school and every one of them may have a certain roll no 5. To uniquely recognize the student we have to say something like "class VII, roll no 5". So, a combination of two or more attributes is combined to make a unique combination of values, such as Class + Roll.
Give short note on the following terms:Dirty pages and ETL a.) Dirty pages. These are buffer pages which comprise modifications which haven't been written to disk. b.
If the deletion violates referential integrity constraint, then three alternatives are available: Default option: - refuse the deletion. It is the job of the DBMS to describ
Prepare Heart Failure Registry database How are you today? Please I would like you to design a Heart Failure registry where doctors will log in to enter information about their
Determine the OBJECTIVES of object design After passing through this unit, you should be able to: describe and apply concept of generalisation; understand and appl
Define the basic operations of the relational algebra? Ans: Basic operators of relational algebra are: 1. Union (∪) - Selects tuples which are in either P or Q or in bot
Normal 0 false false false EN-IN X-NONE X-NONE
how to write a in a text and load it on mysql
What is Specialization? Specialization: Specialization permits you to describe new types of information (new structural types or latest domains of information), although reusin
Explain the Functional Mode with help of an example. Functional Model The functional model shows a computation and functional derivation of data values in it without ind
A basic model of Database Access Control Models of database access control have grown out of previous work on protection in operating systems. Let us talk about one simple mode
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd