Integrity of a database enforced by integrity rules, Database Management System

Assignment Help:

Question:

This Question refers to the database schema given in the Appendix.

(a) The integrity of a database is enforced by integrity rules. Discuss what should happen on an attempt to delete the target of a foreign key reference (for example, to delete a lecturer in the LECTURER table who lectures at least one unit listed in the TIMETABLE table)? Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique by using the above tables.

(b) Using the database schema, express the following queries in SQL:

(i) Create the TIMETABLE table including the primary and foreign key constraints in the code. Make any assumption you want to make.

(ii) Insert the first row in the TIMETABLE table and make any assumption.

(iii) Modify the code value to Workshop for the above record created assuming that the rest of the values have already been created.

(iv) Find the numbers of students who have achieved one or more final grade greater than 14.

(v) Find the student number, unit number and final grade for those students attending units run by the departments named ‘computing' or
‘accountancy'.


Related Discussions:- Integrity of a database enforced by integrity rules

Define a view and a trigger, Define a view and a trigger. Construct a view ...

Define a view and a trigger. Construct a view for the above relations that have the information about suppliers and the elements they supply. The view holds the S#, SNAME, P# , PNA

Write a short note on qbe, Write a short note on QBE? Stands for "Quer...

Write a short note on QBE? Stands for "Query By Example." QBE is a feature involved along with various database applications which gives user-friendly techniques of running da

What are the causes of bucket overflow in a hash file, What are the causes ...

What are the causes of bucket overflow in a hash file organization? What can be done to reduce the occurrence of bucket overflow? When a record is inserted, the bucket to that

Describe the strategies adopted by the ministry of ict, Question 1: (a)...

Question 1: (a) Planning and management of ICT projects have a very poor record in developing countries. Briefly explain five critical success factors for correct implementa

What is disadvantages of dbms, What is Disadvantages Of DBMS ? 1. Cos...

What is Disadvantages Of DBMS ? 1. Cost of Software and Hardware and Migration - A important disadvantage of the DBMS system is cost. 2. Reduced Response and Throughpu

What are the advantages of relational data model, What are the advantages o...

What are the advantages of relational data model? Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer

What is a data dictionary, What is a data dictionary?  A data dictionar...

What is a data dictionary?  A data dictionary is a data structure which keeps Meta data about the structure of the database i.e.  the schema of the database.

Define 1 nf normal form, 1 NF Normal Form The domain of attribute must...

1 NF Normal Form The domain of attribute must add only atomic (simple, indivisible) values First normal form (Minimal Form or 1NF) is a normal form need in database normalizat

Relational schema for person, Example: RELATIONAL SCHEMA for PERSON: ...

Example: RELATIONAL SCHEMA for PERSON: PERSON (PERSON_ID: integer, NAME: string, AGE: integer, ADDRESS: String) RELATION INSTANCE In this instance, m = 3 and n = 4

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd