Integrity of a database enforced by integrity rules, Database Management System

Assignment Help:

Question:

This Question refers to the database schema given in the Appendix.

(a) The integrity of a database is enforced by integrity rules. Discuss what should happen on an attempt to delete the target of a foreign key reference (for example, to delete a lecturer in the LECTURER table who lectures at least one unit listed in the TIMETABLE table)? Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique by using the above tables.

(b) Using the database schema, express the following queries in SQL:

(i) Create the TIMETABLE table including the primary and foreign key constraints in the code. Make any assumption you want to make.

(ii) Insert the first row in the TIMETABLE table and make any assumption.

(iii) Modify the code value to Workshop for the above record created assuming that the rest of the values have already been created.

(iv) Find the numbers of students who have achieved one or more final grade greater than 14.

(v) Find the student number, unit number and final grade for those students attending units run by the departments named ‘computing' or
‘accountancy'.


Related Discussions:- Integrity of a database enforced by integrity rules

Modify - referential integrity, Update or Modify operation alters the exist...

Update or Modify operation alters the existing values. If these operations alter the value that is the foreign key also, the only check need is the similar as that of the Insert op

Stored and derived attributes, Attributes that are directly kept in the dat...

Attributes that are directly kept in the data base. For example, 'Birth date' attribute of a person.   Derived  Attributes that are not stored directly but can be derived

Define average seek time, Define average seek time. The average seek ti...

Define average seek time. The average seek time is the average of the seek times, calculated over a sequence of random requests.

Database application development, The database application project (DAP) fo...

The database application project (DAP) for this assignment consists of the creation of a fully functional Microsoft Access database application for a real client. I recommend you s

Database design and documentation, A use case diagram giving a pictorial ov...

A use case diagram giving a pictorial overview of user requirements and brief use case descriptions. As the case study contains only an outline of a business scenario, you will als

Convert encrypted hsql database into csv format, Project Description: We...

Project Description: We have an encrypted HSQL Database which we want to change into csv format. HSQL DB . We have java application (jar file) which reads that database but n

Pl/SQL, I need solution of the question posted at http://www.expertsmind.c...

I need solution of the question posted at http://www.expertsmind.com/questions/sql-query-for-testing-triggers-and-stored-procedures-30140149.aspx

Define deferred update technique of recovery, Discuss deferred update techn...

Discuss deferred update technique of recovery.  What are the advantages?  Ans:  The deferred update methods do not physically update the database on disk till after a transact

Why we use delegation to share implementation, Use Delegation to Share Impl...

Use Delegation to Share Implementation The delegation " Delegation comprises of catching an operation on one object and sending it to other object which is part, or related to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd