Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain several types of constraints that can be specified using CREATE TABLE command. Explain CASCADE and RESTRICT clauses of DROP SCHEMA command?Constraint DescriptionPRIMARY KEY Determines that column(s) uniquely identifies each record. The primary key cannot be NULL, and the data value(s) must be unique.
FOREIGN KEY In a one-to-many relationship, the constraint is added to the "many" table. The constraint ensures which if a value is entered into a specified column, it must already exist in the "one" table, or the record is not added.
UNIQUE Ensures that all data values stored in a specified column are unique.The UNIQUE constraint differs from the PRIMARY KEY constraint in which it permits NULL values.CHECK Ensures in which a specified condition is true before the data value is added to a table. For example, an order's ship date cannot be previous than its order date.
NOT NULL Ensures in which a specified column cannon contain a NULL value. The NOT NULL constraint can just be created along with the column-level approach to table creation.
Prevents the DROP from taking place if any dependent objects exists (RESTRICT) or causes all dependent objects do also be dropped (CASCADE).
What are the various symbols used to draw an E-R diagram (any 3)?
A Distributed Transaction Let us demonstrate the concept of a distributed transaction by considering a banking system having of three branches located in 3 different cities. Ev
explain in detail about crash recovery
What is Normalization? Database normalization is a data design and organization method applied to data structures based on rules that help building relational databases. In rel
The clause in SQL which specifies that the query result should be sorted in ascending or descending order based upon the values of one or much more columns is Ans : Order by
Describe the four main ways of optimising disk block access. Ans: a. Disk b. Non-volatile writes buffers c. File organization (Clustering) d. Log-based file system
State as Location within a Program In this traditional approach, location of control inside a program totally defines the program state. Any finite state machine may be implem
1. Create the tables for the play-scheme database as specified in the TMA. 2. Enter the data as given in the spreadsheet. 3. Create queries to retrieve specified information
Determine the Strong and Weak Entity Based on the method of foreign key, there might be arise a situation when we have to relate an entity having a primary key of its own and a
List any eight applications of DBMS. a) Universities b) Airlines c) Banking d) Credit card transactions e) Tele communication f) Sales g)Finance h) Manufac
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd