Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
This Question refers to the database schema given in the Appendix.
(a) The integrity of a database is enforced by integrity rules. Discuss what should happen on an attempt to delete the target of a foreign key reference (for example, to delete a lecturer in the LECTURER table who lectures at least one unit listed in the TIMETABLE table)? Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique by using the above tables.
(b) Using the database schema, express the following queries in SQL:
(i) Create the TIMETABLE table including the primary and foreign key constraints in the code. Make any assumption you want to make.
(ii) Insert the first row in the TIMETABLE table and make any assumption.
(iii) Modify the code value to Workshop for the above record created assuming that the rest of the values have already been created.
(iv) Find the numbers of students who have achieved one or more final grade greater than 14.
(v) Find the student number, unit number and final grade for those students attending units run by the departments named ‘computing' or ‘accountancy'.
What are the advantages of having an index structure? Ans: The index structures commonly provide secondary access paths, which offer alternative ways of accessing the reco
define lock conversion
(A) For the relation; CarSales (RegNo, BuyerName, Address, SalesPerson, Make, Model, Commission) The following functional dependences hold, RegNo _ID à Make, Model Reg
Explain hash file organization? Hash functions a) The distribution is uniform Hash functions assign each bucket the similar number of search -key values from the set of a
These are the binary operations; i.e., each is applied to two relations or sets. These two relations can be union compatible excluding in case of Cartesian product. Two relations R
Describe identifying relationship? Identifying relationship: It is relationship among strong entity and a weak entity it is represented through a doubly outlined diamond in C
SET concept is used in which type of modelling? SET concept is used in Network Model.
The Internal or Physical Level The collection of files permanently stored on secondary storage devices is called as the physical database. The internal or physical level is t
A database named yourusernameFMA has been set up for you to use for this assignment. For the FMA you must create the required tables and run the queries using this database. If y
Create a new user : CREATE USER IDENTIFIED BY Example: //CREATE USER MCA12 IDENTIFIED BY W123 Grant: It is used to give database access permission to users. It is of
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd