Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Discuss the types of integrity constraints in which must be checked for the update operations - Insert and Delete. Give examples.
Insert operation can violet any of the subsequent four constraints:
1) Domain constraints could be violated if given attribute value does not appear within corresponding domain. 2) Key constraints could be violated if given attribute value does not appear within corresponding domain. 3) Entity integrity can be violated if the primary key of the latest tuple t is NULL. 4) Referential integrity can be violated if value of any foreign key in t refers to a tuple in which does not exist in referenced relation.
Delete operation can violate only referential integrity constraints, if the tuple being deleted is referenced through the foreign keys from other tuples within the database.
Differentiate between Key and superkey? Key and superkey - A key a single attribute or a combination of two or more attributes of an entity set in which is used to identify o
What is a value? A data value is used for identity. This form of identity is used in relational systems.eg: The primary key value of a tuple recognize the tuple.
Aggregation : One limitation of the E-R diagram is that they do not permit representation of relationships between relationships. In such a case the relationship along with its ent
A customer places orders for parts and belongs to a particular industry group. An individual order is taken by a particular sales representative on a specific date and the sales re
Define instance and schema? Instance: Collection of data kept in the data base at a particular moment is known as an Instance of the database. Schema: The o
These are designed to reduce the effects of a database failure and make sure a database is restored to a consistent state if a failure does arise. Manual backup/restore utilities n
Briefly explain what is to be done during defining problem statement. To define Problem Statement of a system, define what is to be done and how you can go to implement that. Y
Question: In a multi-user database environment, locking mechanisms can be used to solve the three basic problems of concurrency. On the other hand, however, locking may also le
The physical location of a record is determined by which mathematical formula that transforms a file key into a record location? The physical location of a record is determined
I want to fragment existing table using java code... help me..!!
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd