Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the integrity constraints: Not Null, Unique, Primary Key with an example each. Is the combination 'Not Null, Primary Key' a valid combination. Justify.
Not Null - Should hold valid values and cannot be NULL.
Unique - An attribute or a combination of two or more attributes must have a unique value in each row. The unique key can have NULL values.
Primary Key - It is similar as unique key but cannot have NULL values. A table can have at most one primary key in it.
For example:
STUDENT
Roll No
Name
City
Mobile
17
Ankit Vats
Delhi
9891663808
16
Vivek rajput
Meerut
9891468487
6
Vanita
Punjab
NULL
75
Bhavya
delhi
9810618396
Roll No is a primary key.
Name is defined with NOT NULL, means each student must have a name.
'Not Null, Primary Key' is a valid combination. Primary key constraint already includes
'Not Null' constraint in it but we can also add 'Not Null' constraint with it. The use of
'Not Null' with 'Primary Key' will not have any effect. It is same as if we are using just 'Primary Key'.
Write short note on Data models? Data models: A data model is an abstract model which elaborates how data is represented and accessed. The term data model has two commonly ac
a. Define the term "deadlock". There are four conditions that must hold before deadlock is possible. Name them. b. Outline an algorithm that detects whether there is a deadlock.
What is the use of RAID? A variety of disk-organization methods, collectively called redundant arrays of independent disks are used to better the performance and reliability.
Law Associates is a large legal practice based in Sydney. You have been asked to design a data model for the practice based upon the following specification: The practice emplo
Write a query that display ename annual salary and comm from emp table
Hierarchical
File Organisation In Dbms Introduction Databases are used to store information. Usually, the principal operations we have to perform on database are those relating to:
Example: //REVOKE ALL ON EMP FROM MCA12; (All permissions will be cancelled) You can also cancel only some of the permissions. Drop: A user-
What is serialization? Where it is used and why? Serialization is a basic term used for mechanisms which enable objects and object structures to be converted into portable for
Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd