Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Consider the relations described below: PHYSICIAN (regno, name, telno, city)PATIENT (pname, street, city) VISIT (pname, regno, date_of_visit, fee) Where the regno and pname identify the physician and the patient uniquely corresponding. Express queries (i) to (iii) in SQL.(i) Get the name and regno of physicians who are in Delhi.(ii) Find out the name and city of patient(s) who visited a physician on 31 August 2004.(iii) Get the name of the physician and the total number of patients who have visited her.(iv) What does the subsequent SQL query answer SELECT DISTINCT nameFROM PHYSICIAN PWHERE NOT EXISTS( SELECT *FROM VISITWHERE regno = p.regno )
(i) Select name, regno from PHYSICIAN where city = ‘Delhi'; (ii) Select pname, city from PATIENT,VISIT where PATIENT.pname=VISIT.pname and date_of_visit = '31-Aug-04'; (iii) select name, count(*) from PHYSICIAN, VISIT where PHYSICIAN.regno = VISIT.regno group by Physician . regno; (iv) This will provide the name of physicians who have not visited any patient.
What are the categories of SQL command? SQL commands are separated in to the following categories: 1. Data - Definitition Language 2. Data Manipulation language 3. Dat
Explain Data Sublangauges ? Data sublanguage: In relational database theory, the term sublanguage, first used for this purpose through E. F. Codd in the year of 1970, refers t
Describe queries with complex types? The present extension of the SQL query language deal with the complex type Let us start with the simple example: Find the title and t
Benefits of Hashed file Organisation 1. Insertion or search on hash-key is quick. 2. Best if equality search is required on hash-key. Drawbacks of Hashed file
State as Location within a Program In this traditional approach, location of control inside a program totally defines the program state. Any finite state machine may be implem
What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it
State about the Use Case Diagram A use case diagram represents a set of use cases, actors and their relationships. These diagrams shall be used to model context or requirement
Question 1: (a) Planning and management of ICT projects have a very poor record in developing countries. Briefly explain five critical success factors for correct implementa
Define outer union operation of the relational algebra. Compute the outer union for the relations R and S given below. Outer Join - If there are any values in one tabl
Explain the dependency relationship of object oriented A dependency is a relationship which states that a change in specification of one thing can affect another thing, but n
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd