Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Consider the relations described below: PHYSICIAN (regno, name, telno, city)PATIENT (pname, street, city) VISIT (pname, regno, date_of_visit, fee) Where the regno and pname identify the physician and the patient uniquely corresponding. Express queries (i) to (iii) in SQL.(i) Get the name and regno of physicians who are in Delhi.(ii) Find out the name and city of patient(s) who visited a physician on 31 August 2004.(iii) Get the name of the physician and the total number of patients who have visited her.(iv) What does the subsequent SQL query answer SELECT DISTINCT nameFROM PHYSICIAN PWHERE NOT EXISTS( SELECT *FROM VISITWHERE regno = p.regno )
(i) Select name, regno from PHYSICIAN where city = ‘Delhi'; (ii) Select pname, city from PATIENT,VISIT where PATIENT.pname=VISIT.pname and date_of_visit = '31-Aug-04'; (iii) select name, count(*) from PHYSICIAN, VISIT where PHYSICIAN.regno = VISIT.regno group by Physician . regno; (iv) This will provide the name of physicians who have not visited any patient.
How does Oracle act as ODBC and give examples of front end uses with ODBC? ODBC achieve portability at the level of the executable by introducing an extra level of indirection.
Explain the terms primary key, candidate key, alternate key and secondary key. In the given table identify every key? STUDENT(SID,Regno, Name, City) Primary Key: The prim
Process of Adjustment of inheritance During object design, inheritance is readjusted by rearranging classes and operations, and abstracting common behaviour.
List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of
Question (a) Concurrent access to data from a database is a normal part of application program usage. Describe three approaches to concurrency control (b) Distinguish among
Define weak and strong entity sets? Weak entity set: entity set that do not have key attribute of their own are known as weak entity sets. Strong entity set
Database design Database tables will be created for you on the Technology web server. The schema will be as follows. Please note that this is a simplified database structure, d
What is persistency? Persistency ensures which data is stored and that after the object is no longer available (program stops running) the data will be available to other users
what do you mean by primary key constraint?
List the table modification commands in SQL? A) Deletion B) Updates C) Insertion D) Update of a view
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd