Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
How many types of users works on database?
Users are differentiated through the way they expect to interact along with the system
(i) Application programmers-interact with system through DML calls (ii) Sophisticated users-form requests within a database query language (iii) Specialized users-write specialized database applications that do not fit within the traditional data processing framework (iv) Naive users-invoke one of the permanent application programs which have been written previously instance, people accessing database over the web, clerical staff, bank tellers
List the steps for converting state diagram to the code. a) Finding major control path b) Finding the conditional statements c) Finding the loops d) Finding error ro
The PROJECT operation The project operation is used to choose the records with specified attributes as discarding the others based on some related criteria. This is denotes as ∏
List two restrictions that are applied on the modification (updation, insertion or deletion) of base tables through view. Ans: The two restrictions are: 1. If a view
Although how will the system recover The selection of REDO or UNDO for a transaction for the recovery is completed on the basis of the state of the transactions. This state is
Explain the systems development life cycle. This is the traditional method to develop, maintain, and replace information systems that contains the project identification and se
System level permissions : With the use of data dictionary you can view them. Let us take the table name as user_sys_privs (used in oracle). DESCRIBE USER_SYS_PRI
Define deadlock avoidance. An alternative method for avoiding deadlocks is to needs additional information about how resources are to be requested. Each request requires the s
The database files accept the actual data and are typically the biggest in size. Depending on their shape, the tables for all the user operation can go in one database file-but
How are tables stored on Disk? We realise that every record of a table can have different amounts of data. This is due to in some records; some attribute values may be "zero".
The Update Operations : Update operations are used for altering database values. The constraint violations faced by this operation are logically the similar as the problem faced
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd