Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Consider the relations described below: PHYSICIAN (regno, name, telno, city)PATIENT (pname, street, city) VISIT (pname, regno, date_of_visit, fee) Where the regno and pname identify the physician and the patient uniquely corresponding. Express queries (i) to (iii) in SQL.(i) Get the name and regno of physicians who are in Delhi.(ii) Find out the name and city of patient(s) who visited a physician on 31 August 2004.(iii) Get the name of the physician and the total number of patients who have visited her.(iv) What does the subsequent SQL query answer SELECT DISTINCT nameFROM PHYSICIAN PWHERE NOT EXISTS( SELECT *FROM VISITWHERE regno = p.regno )
(i) Select name, regno from PHYSICIAN where city = ‘Delhi'; (ii) Select pname, city from PATIENT,VISIT where PATIENT.pname=VISIT.pname and date_of_visit = '31-Aug-04'; (iii) select name, count(*) from PHYSICIAN, VISIT where PHYSICIAN.regno = VISIT.regno group by Physician . regno; (iv) This will provide the name of physicians who have not visited any patient.
The Locking Protocol: To manage concurrency related problems we use locking. A lock is mainly a variable that is associated with a data item in the database. A lock can be located
User error : This contains errors in the program (e.g., Logical errors) with errors made by online users of database. These types of errors can be avoided by applying some check
Explain the concept of deadlock Yes. It can direct to deadlock. Suppose that a batch of frames arrived correctly and were accepted. Then receiver will advance its window. Now s
i want answers this assignment now if yiu can maket for me now ?
We define a view in SQL through using the create view command. To describe a view, we must provide the view a name and must state the query in which computers the view. The form of
Types Of Indexes One of the words used during the file organisation is the term index. In this part, let us describe this term in more detail. We find the index of keywords
What are the different integrity constraints in RDBMS? The various integrity constraints in RDBMS are as: Primary Key: primary key is a grouping of one or more attributes
First Normal Form and second normal form First Normal Form (1NF) A relation is said to be in 1NF if it having no non-atomic values and each row can give a unique combinat
Describe how you can simplify Operations. To simplify operation, one should use inheritance, where possible to use, to reduce the quantity of distinct operations. Introduce new
Deletion Anomalies: Loss of important Information: In some cases, useful information may be lost when a tuple is deleted. For instance, if we delete the tuple corresponding to stu
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd