Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Determine the Strong and Weak Entity
Based on the method of foreign key, there might be arise a situation when we have to relate an entity having a primary key of its own and an entity not having a primary key of its own. In such a case, the entity having its own primary key is known as a strong entity and the entity not having its own primary key is known as a weak entity. Whenever we need to relate a strong and a weak entity together, the ERD would alter just a little.
Say, for instance, we have a statement "A Student lives in a Home." STUDENT is obviously a strong entity having a primary key Roll. But HOME might not have a unique primary key, as its only attribute Address may be shared by a lot of homes (what if it is a housing estate?). HOME is a weak entity in this case.
Code an Oracle Database trigger to enforce the constraint that an employee can never change his or her department.
Log based recovery: Let us first describe the term transaction log in the context of DBMS. A transaction log is a record in DBMS that remains track of all the transactions of a dat
Question: (a) Use the following business rules to produce the E-R diagram. You should clearly show all the minimum and maximum cardinality constraint on each side of the relati
Hardware failure : Hardware failures are the failures when some disk or hardware chip fails. This may result in loss of data. One such trouble can be that a disk gets damaged and
What is Natural Language Interfaces? Natural Language Interfaces - These interfaces accept requests written within English or a few other language and attempt to "understand" t
What are the object-oriented approaches Software systems which are designed with structured design methodology never support some of desired quality attributes for example reus
Mention the several levels in security measures. A) Database system B) Operating system C) Network D) Physical Human
please describe the data base management with the easy example &give the application?
What are the benefits of OOA technology? Using OOA technology can produce many benefits, such as: i) Reusability of code ii) Productivity is gained through direct mappi
Define the terms 1) physical schema 2) logical schema. Physical schema: The physical schema explains the database design at the physical level, which is the lowest lev
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd