Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Example: -Show the employees whose job title is the similar as that of employee 7566 and salary is extra than the salary of employee 7788.
Let consider the given partial relation EMP. Let us make some sub-queries for them
EMPNO
ENAME
JOB
SAL
DEPTNO
7566
Nirmal
MANAGER
2975
10
7788
Kailash
ANALYST
3000
7839
Karuna
PRESIDENT
5000
20
7902
Ashwin
7905
Ashwini
4000
SELECT ENAME, JOB
FROM EMP
WHERE JOB = (SELECT JOB
WHERE EMPPNO = 7566)
AND SAL > (SELECT SAL
WHERE EMPPNO=7788);
Output: Job title for the employee 7566 occurs to be 'MANAGER')
Support by Adding Indexes Multiple indexes can be used to access a data file by multiple access paths. In such a scheme only single copy of the data is consider, only the numbe
As with other software, databases can potentially be used for unethical purposes. As a database developer, and a consumer, you should recognize database misuse, and how it may affe
List any two disadvantages of a database system ? The disadvantages of database system are: • Database systems are difficult, complex, and time-consuming to design. • Substanti
i am required to come up with entities relationships, optionality and cardinality from a scenario. there is a night club and bookings for a musician band
What is Conceptual Schema? Conceptual Schema - Conceptual schema elaborates the structure of the overall database for a community of users. It hides the details of physical sto
Define weak and strong entity sets? Weak entity set: entity set that do not have key attribute of their own are known as weak entity sets. Strong entity set: Entity set that
brief history,definition,current trends and future trends if any of data fragmentation
Define raid? Briefly explain it? A range of disk organization methods, collectively called redundant arrays of independent disks (RAID) o Improvement of reliability throug
What does the extract statement do in extract datasets? The data is written to virtual memory by extract commands.
explain three types of internet risks to the consummers whent he business system is data dependent. how can we minimise these risks
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd